A portable cybersecurity toolkit that fits in your pocket
Web Installer β’ Documentation β’ Report Bug β’ Request Feature
MCT2032 transforms the Waveshare ESP32-S3-LCD-1.47 into a powerful cybersecurity research tool. With its circular display, dual-core processor, and wireless capabilities, it's the perfect platform for security professionals and enthusiasts.
Why "Mini"? At just 50mm Γ 38.5mm and $12.99, MCT2032 proves that powerful security tools don't need to be expensive or bulky. It's the most affordable entry point into professional WiFi security research.
The Waveshare ESP32-S3-LCD-1.47 is the first of its kind to be transformed into a dedicated cybersecurity tool. While others focus on generic IoT projects, we're pioneering its use in the security sector.
Component | Specification |
---|---|
Processor | ESP32-S3 Dual-core Xtensa LX7 @ 240MHz |
Memory | 512KB SRAM, 384KB ROM, 16MB Flash, 8MB PSRAM |
Display | 1.47" Round LCD (172Γ320, 262K colors, ST7789 driver) |
Wireless | 2.4GHz WiFi (802.11 b/g/n), Bluetooth 5.0 LE |
Storage | MicroSD card slot (SPI) |
USB | Type-C with native USB support |
GPIO | 14 programmable pins |
Extras | RGB LED, BOOT/RESET buttons |
Power | 5V via USB-C, 3.3V operating |
Size | 50.0mm Γ 38.5mm (pocket-sized!) |
Price | ~$12.99 (Incredible value!) |
- π Dual-Core Power: Run packet capture on one core, UI on the other
- π‘ Integrated Antenna: No external antenna needed for WiFi/BLE operations
- πΎ Massive Memory: 8MB PSRAM handles large packet buffers
- π¨ Circular Display: Unique form factor with custom cyberpunk UI
- π Native USB: Direct serial communication, no adapter needed
- π° Affordable: Professional features at hobbyist price
- β
WiFi Scanner - Comprehensive network analysis
- SSID, BSSID, Channel, RSSI, Security detection
- Hidden network discovery
- Channel-specific scanning
- Real-time signal strength indicators
- β Stop Scan - Interrupt long-running scans
- β
BLE Admin Console - Full device control via Bluetooth
- Cross-platform Python application
- Dark hacker-themed UI
- Real-time data visualization
- β Chunked Data Transfer - Handle large datasets over BLE
- β Web Installer - Browser-based firmware flashing
- β Circular UI - Custom LVGL interface with animations
- π¨ Packet Monitor (promiscuous mode)
- π¨ Deauth Attack capability
- π¨ Beacon Spam framework
- π¨ PCAP capture infrastructure
- π¨ Evil Portal framework
- π΄ BLE Scanning: Not implemented (returns "Not implemented yet")
- π‘ SD Card: Not tested, may need initialization
- π‘ Battery Monitor: Returns dummy value (100%)
- π‘ Advanced Features: Framework only, not functional yet
- Implement BLE scanning functionality
- Add SD card support for PCAP storage
- Implement packet injection for deauth
- Create settings persistence system
- Add OTA update capability
- Battery voltage monitoring
- Channel hopping visualization
- Signal strength graphs
- Export scan results to CSV
- Implement WPS pin attacks
- Custom boot logo
- Sound effects via piezo
- RGB LED patterns for status
- Power saving modes
- β Basic WiFi scanning
- β BLE communication
- β Admin console
- β Web installer
- π― Active packet monitoring
- π― Deauth attack implementation
- π― Beacon spam activation
- π― PCAP file creation
- π― Evil Portal deployment
- π― WPS vulnerability scanner
- π― Bluetooth device scanner
- π― Mesh network analysis
- π― Custom packet crafting
- π― Protocol fuzzing
- π― MITM capabilities
- π― Network mapping visualization
- π― Cloud dashboard
- π― Multi-device coordination
- π― AI-powered threat detection
- π― Automated penetration testing
We need YOUR help to make MCT2032 the ultimate pocket cyber tool!
- Enhance the admin console UI
- Add data visualization features
- Implement export formats
- Create automated testing scripts
- Implement BLE scanning
- Optimize packet capture
- Add new attack vectors
- Improve memory management
- Create custom icons
- Design new UI themes
- Improve user workflows
- Create animation effects
- Write tutorials
- Create video guides
- Translate documentation
- Document API endpoints
- Test attack implementations
- Find vulnerabilities
- Suggest new features
- Create PoC exploits
- Fork the repository
- Check our Issues page
- Pick a task from the TODO list
- Create a feature branch
- Submit a Pull Request
# Clone the repo
git clone https://github.com/webdevtodayjason/mct2032.git
cd mct2032
# Set up firmware development
cd mct2032-firmware
pio lib install
# Set up admin console
cd ../mct2032-admin
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt
- Visit https://webdevtodayjason.github.io/mct2032/
- Connect your ESP32-S3 device via USB
- Click "Install" and follow the prompts
- Download and run the admin console
# Clone the repository
git clone https://github.com/webdevtodayjason/mct2032.git
cd mct2032
# Build and upload firmware
cd mct2032-firmware
pio run -t upload
# Run admin console
cd ../mct2032-admin
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
pip install -r requirements.txt
python main.py
- Background: Deep dark blue (#0a0e27, #0f0f23)
- Border: Purple gradient with glow effect (#8b5cf6)
- Status Text: Terminal green (#00ff41)
- Mode Indicators: Color-coded (Idle=Green, Scanning=Cyan, Attack=Red, etc.)
- Connection Status: Visual indicator (Red=Disconnected, Green=Connected)
- Framework: Python Tkinter with CustomTkinter
- Theme: Dark hacker aesthetic matching the device
- Features:
- Real-time WiFi network display with signal strength indicators
- Console log with timestamp
- Tabbed interface for different functions
- Stop scan functionality
- Transport: Bluetooth LE with custom GATT service
- Chunking: Automatic chunking for responses > 512 bytes
- Format: JSON-based command/response protocol
- Commands: SCAN_WIFI, SCAN_BLE, GET_STATUS, and more
- Passive Scanning: Non-intrusive network discovery
- Channel Hopping: Monitor multiple channels
- Packet Analysis: Detailed frame type statistics
- Research Mode: Advanced features for security testing
This project is configured for Claude Code. See CLAUDE.md
for detailed instructions.
- Always update tasks in Dart before starting work
- Use Context7 for latest documentation
- Follow the dark hacker theme with purple gradients
- Test with Playwright
- Log all development activities
mct2032/
βββ mct2032-firmware/ # ESP32 firmware (PlatformIO)
β βββ include/ # Header files
β βββ src/ # Source files
β βββ platformio.ini # Build configuration
βββ mct2032-admin/ # Python admin console
β βββ mct2032_admin/ # Package source
β βββ requirements.txt # Python dependencies
βββ web-installer/ # Web-based firmware installer
βββ docs/ # Additional documentation
βββ scripts/ # Build and release scripts
βββ .claude/ # Claude Code configuration
βββ logs/ # Development logs
cd mct2032-firmware
pio run # Build
pio run -t upload # Upload to device
pio device monitor # Serial monitor
cd mct2032-admin
pip install -r requirements.txt
python main.py
- Check Dart for open tasks
- Follow the established code style
- Test all changes thoroughly
- Update documentation as needed
Feature | MCT2032 | Flipper Zero | WiFi Pineapple | Proxmark3 |
---|---|---|---|---|
Price | $12.99 | $169 (+$29 for WiFi) | $99-$399 | $300+ |
WiFi Attacks | β Native | β Specialized | β | |
Bluetooth | β BLE 5.0 | β BLE | β | β |
Display | β Color LCD | β Monochrome | β Web UI | β |
Sub-GHz Radio | β | β | β | β |
NFC/RFID | β | β | β | β Specialized |
Infrared | β | β | β | β |
Open Source | β | β | β | β |
Pocket Size | β (50mm) | β | β | |
Web Installer | β | β | β | β |
Battery | USB-C Power | β Built-in | USB Power | |
Target Users | WiFi/BLE Research | Multi-Protocol | WiFi Pentesting | RFID Research |
graph TD
A[ESP32-S3] -->|SPI| B[1.47" LCD]
A -->|WiFi| C[2.4GHz Networks]
A -->|BLE| D[Admin Console]
A -->|GPIO| E[RGB LED]
A -->|SPI| F[SD Card]
D -->|Python| G[Cross-Platform GUI]
C -->|Scan| H[Network Data]
H -->|JSON| D
- π Getting Started Guide
- π§ Hardware Setup
- π» API Reference
- π¨ UI Customization
- π Security Features
- π‘ Protocol Documentation
- π¬ Discord Server (Coming Soon)
- π¦ Twitter Updates (Coming Soon)
- πΊ YouTube Tutorials (Coming Soon)
- π Blog (Coming Soon)
- Inspired by ESP32 Marauder and Bruce
- Built with ESP-IDF and PlatformIO
- UI powered by LVGL
- Admin console uses CustomTkinter
IMPORTANT: This tool is designed for legitimate security research and testing on networks you own or have explicit permission to test.
β οΈ Unauthorized network scanning or attacks are illegalβ οΈ Users are responsible for complying with all applicable lawsβ οΈ We are not responsible for misuse of this tool- β Only use on networks you own or have written permission to test
This project is licensed under the MIT License - see the LICENSE file for details.