Skip to content

DMFSouza/Fapper_Zero

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Fapper Zero Firmware HUN73R.0047

Firmware designed and developed by David Miguel (HUN73R.0047) (https://github.com/DMFSouza).

If you enjoyed this project, consider buying me a coffee:

coffee

If you're Brazilian, consider using Pix key:

coffee



Summary

  • Installation
  • Wifi Mode
  • Usb Mode
  • Bluetooth Mode
  • IR Mode
  • RF Mode
  • RFID Mode
  • SD Logs
  • Sleep Mode
  • Bugs
  • Disclaimer
  • Introduction

    This code aims to be an Open Source alternative to the Flipper Zero. It is based on the LilyGo ESP32 S3 hardware, T-Embed model, but it can be adapted to other ESP32 models as well. The idea is to create an affordable alternative to the Flipper, which faces various legal restrictions in many countries. And why this name? Well, because I found it amusing.

    Installation

    1) SD Files

    • Download everything from the 'SD_CARD' folder and place it on a MicroSD card.

    2) Lib Files

    • This code uses several libraries that I had to modify manually. Therefore, for its correct operation, it is necessary to use the libraries available in the Lib folder of this repository.

    3) Arduino IDE Config

  • This project uses the esp32fs plugin. Please note that Arduino IDE version 2.x does not support the esp32fs plugin. Use Arduino 1.18.x to upload resource files.

  • Please refer to the following figure for specific options


  • IMAGE ALT TEXT


    Wifi Mode

    IMAGE ALT TEXT

    In WiFi mode, there are four modes, with only two currently functional.

  • Sniffer Mode: This mode allows you to connect to a Wi-Fi network and sniff its packets. The packets will be displayed on the screen, and the logs will be saved on the SD card.
  • IMAGE ALT TEXT


    IMAGE ALT TEXT


    IMAGE ALT TEXT


  • Deauther Mode - Under construction

  • Captive Portal Mode: Captive Portal Mode: This mode allows you to create a captive portal capable of capturing credentials. The pages can be customized; you just need to create your HTML and place it in the /captive_portals/pages folder. In the corresponding menu, a dropdown field with all available HTML pages will be presented. After selecting your preferred one and clicking Start, a local network will be created with the name of your HTML plus "Wifi-4G". For example, if your HTML file is named "lospolloshermanos", your SSID will be "lospolloshermanos-wifi-4G". Easy, right?
    IMAGE ALT TEXT How do you know if you've succeeded? A calm fishing animation will be displayed. When you catch a fish, an image of the capture will be shown on your screen.
    IMAGE ALT TEXT And where do the credentials go? Captured credentials are saved in the logs folder and can be accessed in the SD option of the main menu.

  • IMAGE ALT TEXT


    And then? An error page will be opened on the network:

    IMAGE ALT TEXT


  • Evil Twin Mode - Under construction
  • Beacom: This module creates several fake Wi-Fi access points with funny names.

  • IMAGE ALT TEXT


    Bluetooth Mode

    IMAGE ALT TEXT

    The exploit was initially developed and discovered by ECTO-1A. I adapted it for use with ESP32 and RPi (and any devices capable of running Python). The scripts are primarily designed for ESP32, as ESP8266 lacks BLE capability.

    IMAGE ALT TEXT

    Usb Mode

    IMAGE ALT TEXT

  • In USB mode, you can save your Rubber Ducky scripts in text format in the duckyscripts folder on the SD card. When accessing the menu, a dropdown field with all the scripts from the folder will be presented. Select the one you desire, and after connecting the hardware to the target device, click on Start, and watch the magic happen.

  • IMAGE ALT TEXT

    IR Mode

    IMAGE ALT TEXT

    For this project, a copper-clad phenolic PCB was created, onto which the future CC1101 radio frequency module was soldered, along with a space for the IR LED as depicted in the image.

    IMAGE ALT TEXT IMAGE ALT TEXT

    A hole was drilled in the plastic body of the T-Embed where the LED was positioned, the negative pin was connected to the board's GND, and the VCC was connected to a 100k resistor and then linked to IO17.

    IMAGE ALT TEXT

    IMAGE ALT TEXT

    Project demonstration in operation:

    IMAGE ALT TEXT

    RF Mode

    IMAGE ALT TEXT

  • Under construction
  • The RF mode is still under development, currently having only the graphical interface available.

    IMAGE ALT TEXT

    RFID Mode

    IMAGE ALT TEXT

    For the RFID module, I'm using an RFID module from M5 Stack, which is a modified MFRC522 designed to work with I2C. I removed it from its original case and attached it to the back of the T-Embed as shown in the image.
    IMAGE ALT TEXT1 IMAGE ALT TEXT

    IMAGE ALT TEXT2
    Read mode, in this mode it is possible to read an RFID card and save its basic data or try to authenticate it with default keys and then save these keys on the SD card.
    IMAGE ALT TEXT3

    IMAGE ALT TEXT4
    Clone Module: In this module, it's possible to clone an RFID card.
    IMAGE ALT TEXT5
    Saved Module: In this module, you can view the saved cards and delete them. Please note that only the first eight cards will be listed.
    IMAGE ALT TEXT6
    CUID Mode: In this mode, you can select one of the UIDs saved on the SD card and rewrite it onto a Magic technology card. Please note that this option should only be used with Magic cards; attempting to use it with a normal card may result in the card being blocked.
    IMAGE ALT TEXT7

    SD Logs

    IMAGE ALT TEXT

  • In the SD menu, you can view all the captured credentials from the captive portal in a tabular format.

  • IMAGE ALT TEXT

    Sleep Mode

    Press the central button of the encoder to activate Sleep mode. When this mode is activated, all pins will be set to low, and the device will enter power-saving mode.

    Bugs

    The code has some bugs, I ask for everyone's understanding as this is a preliminary version of the code, and I am updating this project only in my free time. Any help in its development or improvement will be very welcome; I ask that you only use the Develop branch for commits.

    Disclaimer

    Fapper Zero is a basic device for professionals and cybersecurity enthusiasts.

    We are not responsible for the incorrect use of Fapper Zero.

    Be careful with this device and the transmission of signals. Make sure to follow the laws that apply to your country.