Skip to content

webdevtodayjason/mct2032

Repository files navigation

MCT2032 - Mini Cyber Tool 2032

MCT2032 Logo

GitHub release License: MIT ESP32 PlatformIO Python Web Installer

A portable cybersecurity toolkit that fits in your pocket

Web Installer β€’ Documentation β€’ Report Bug β€’ Request Feature


🎯 About The Project

MCT2032 transforms the Waveshare ESP32-S3-LCD-1.47 into a powerful cybersecurity research tool. With its circular display, dual-core processor, and wireless capabilities, it's the perfect platform for security professionals and enthusiasts.

Why "Mini"? At just 50mm Γ— 38.5mm and $12.99, MCT2032 proves that powerful security tools don't need to be expensive or bulky. It's the most affordable entry point into professional WiFi security research.

Waveshare ESP32-S3-LCD-1.47

πŸ›‘οΈ Hardware: Waveshare ESP32-S3-LCD-1.47

Why This Device?

The Waveshare ESP32-S3-LCD-1.47 is the first of its kind to be transformed into a dedicated cybersecurity tool. While others focus on generic IoT projects, we're pioneering its use in the security sector.

Technical Specifications

Component Specification
Processor ESP32-S3 Dual-core Xtensa LX7 @ 240MHz
Memory 512KB SRAM, 384KB ROM, 16MB Flash, 8MB PSRAM
Display 1.47" Round LCD (172Γ—320, 262K colors, ST7789 driver)
Wireless 2.4GHz WiFi (802.11 b/g/n), Bluetooth 5.0 LE
Storage MicroSD card slot (SPI)
USB Type-C with native USB support
GPIO 14 programmable pins
Extras RGB LED, BOOT/RESET buttons
Power 5V via USB-C, 3.3V operating
Size 50.0mm Γ— 38.5mm (pocket-sized!)
Price ~$12.99 (Incredible value!)

Why It's Perfect for Cybersecurity

  • πŸš€ Dual-Core Power: Run packet capture on one core, UI on the other
  • πŸ“‘ Integrated Antenna: No external antenna needed for WiFi/BLE operations
  • πŸ’Ύ Massive Memory: 8MB PSRAM handles large packet buffers
  • 🎨 Circular Display: Unique form factor with custom cyberpunk UI
  • πŸ”Œ Native USB: Direct serial communication, no adapter needed
  • πŸ’° Affordable: Professional features at hobbyist price

✨ Current Features

🟒 Working

  • βœ… WiFi Scanner - Comprehensive network analysis
    • SSID, BSSID, Channel, RSSI, Security detection
    • Hidden network discovery
    • Channel-specific scanning
    • Real-time signal strength indicators
  • βœ… Stop Scan - Interrupt long-running scans
  • βœ… BLE Admin Console - Full device control via Bluetooth
    • Cross-platform Python application
    • Dark hacker-themed UI
    • Real-time data visualization
  • βœ… Chunked Data Transfer - Handle large datasets over BLE
  • βœ… Web Installer - Browser-based firmware flashing
  • βœ… Circular UI - Custom LVGL interface with animations

🟑 Framework Ready (Not Active)

  • πŸ”¨ Packet Monitor (promiscuous mode)
  • πŸ”¨ Deauth Attack capability
  • πŸ”¨ Beacon Spam framework
  • πŸ”¨ PCAP capture infrastructure
  • πŸ”¨ Evil Portal framework

πŸ› Known Issues

  • πŸ”΄ BLE Scanning: Not implemented (returns "Not implemented yet")
  • 🟑 SD Card: Not tested, may need initialization
  • 🟑 Battery Monitor: Returns dummy value (100%)
  • 🟑 Advanced Features: Framework only, not functional yet

πŸ“‹ TODO List

High Priority

  • Implement BLE scanning functionality
  • Add SD card support for PCAP storage
  • Implement packet injection for deauth
  • Create settings persistence system
  • Add OTA update capability

Medium Priority

  • Battery voltage monitoring
  • Channel hopping visualization
  • Signal strength graphs
  • Export scan results to CSV
  • Implement WPS pin attacks

Low Priority

  • Custom boot logo
  • Sound effects via piezo
  • RGB LED patterns for status
  • Power saving modes

πŸ—ΊοΈ Roadmap

Phase 1: Foundation (Current)

  • βœ… Basic WiFi scanning
  • βœ… BLE communication
  • βœ… Admin console
  • βœ… Web installer

Phase 2: Security Tools (Q1 2025)

  • 🎯 Active packet monitoring
  • 🎯 Deauth attack implementation
  • 🎯 Beacon spam activation
  • 🎯 PCAP file creation

Phase 3: Advanced Features (Q2 2025)

  • 🎯 Evil Portal deployment
  • 🎯 WPS vulnerability scanner
  • 🎯 Bluetooth device scanner
  • 🎯 Mesh network analysis

Phase 4: Professional Tools (Q3 2025)

  • 🎯 Custom packet crafting
  • 🎯 Protocol fuzzing
  • 🎯 MITM capabilities
  • 🎯 Network mapping visualization

Phase 5: Integration (Q4 2025)

  • 🎯 Cloud dashboard
  • 🎯 Multi-device coordination
  • 🎯 AI-powered threat detection
  • 🎯 Automated penetration testing

🀝 Contributing

We need YOUR help to make MCT2032 the ultimate pocket cyber tool!

How You Can Help

🐍 Python Developers

  • Enhance the admin console UI
  • Add data visualization features
  • Implement export formats
  • Create automated testing scripts

πŸ”§ C++ Developers

  • Implement BLE scanning
  • Optimize packet capture
  • Add new attack vectors
  • Improve memory management

🎨 UI/UX Designers

  • Create custom icons
  • Design new UI themes
  • Improve user workflows
  • Create animation effects

πŸ“š Documentation Writers

  • Write tutorials
  • Create video guides
  • Translate documentation
  • Document API endpoints

πŸ§ͺ Security Researchers

  • Test attack implementations
  • Find vulnerabilities
  • Suggest new features
  • Create PoC exploits

Getting Started

  1. Fork the repository
  2. Check our Issues page
  3. Pick a task from the TODO list
  4. Create a feature branch
  5. Submit a Pull Request

Development Setup

# Clone the repo
git clone https://github.com/webdevtodayjason/mct2032.git
cd mct2032

# Set up firmware development
cd mct2032-firmware
pio lib install

# Set up admin console
cd ../mct2032-admin
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt

πŸš€ Quick Start

Option 1: Web Installer (Recommended)

  1. Visit https://webdevtodayjason.github.io/mct2032/
  2. Connect your ESP32-S3 device via USB
  3. Click "Install" and follow the prompts
  4. Download and run the admin console

Option 2: Build from Source

# Clone the repository
git clone https://github.com/webdevtodayjason/mct2032.git
cd mct2032

# Build and upload firmware
cd mct2032-firmware
pio run -t upload

# Run admin console
cd ../mct2032-admin
python -m venv venv
source venv/bin/activate  # Windows: venv\Scripts\activate
pip install -r requirements.txt
python main.py

UI Design

ESP32 Display

  • Background: Deep dark blue (#0a0e27, #0f0f23)
  • Border: Purple gradient with glow effect (#8b5cf6)
  • Status Text: Terminal green (#00ff41)
  • Mode Indicators: Color-coded (Idle=Green, Scanning=Cyan, Attack=Red, etc.)
  • Connection Status: Visual indicator (Red=Disconnected, Green=Connected)

Admin Console

  • Framework: Python Tkinter with CustomTkinter
  • Theme: Dark hacker aesthetic matching the device
  • Features:
    • Real-time WiFi network display with signal strength indicators
    • Console log with timestamp
    • Tabbed interface for different functions
    • Stop scan functionality

Technical Details

Communication Protocol

  • Transport: Bluetooth LE with custom GATT service
  • Chunking: Automatic chunking for responses > 512 bytes
  • Format: JSON-based command/response protocol
  • Commands: SCAN_WIFI, SCAN_BLE, GET_STATUS, and more

Security Features

  • Passive Scanning: Non-intrusive network discovery
  • Channel Hopping: Monitor multiple channels
  • Packet Analysis: Detailed frame type statistics
  • Research Mode: Advanced features for security testing

Development with Claude Code

This project is configured for Claude Code. See CLAUDE.md for detailed instructions.

Key Points:

  • Always update tasks in Dart before starting work
  • Use Context7 for latest documentation
  • Follow the dark hacker theme with purple gradients
  • Test with Playwright
  • Log all development activities

Project Structure

mct2032/
β”œβ”€β”€ mct2032-firmware/     # ESP32 firmware (PlatformIO)
β”‚   β”œβ”€β”€ include/          # Header files
β”‚   β”œβ”€β”€ src/              # Source files
β”‚   └── platformio.ini    # Build configuration
β”œβ”€β”€ mct2032-admin/        # Python admin console
β”‚   β”œβ”€β”€ mct2032_admin/    # Package source
β”‚   └── requirements.txt  # Python dependencies
β”œβ”€β”€ web-installer/        # Web-based firmware installer
β”œβ”€β”€ docs/                 # Additional documentation
β”œβ”€β”€ scripts/              # Build and release scripts
β”œβ”€β”€ .claude/              # Claude Code configuration
└── logs/                 # Development logs

Building from Source

Firmware

cd mct2032-firmware
pio run                    # Build
pio run -t upload          # Upload to device
pio device monitor         # Serial monitor

Admin Console

cd mct2032-admin
pip install -r requirements.txt
python main.py

Contributing

  1. Check Dart for open tasks
  2. Follow the established code style
  3. Test all changes thoroughly
  4. Update documentation as needed

πŸ“Έ Screenshots

Device Back
Compact Design
Scanning Mode
Scanning Mode
Admin Console
Admin Console

πŸ† Why MCT2032?

Compared to Other Tools

Feature MCT2032 Flipper Zero WiFi Pineapple Proxmark3
Price $12.99 $169 (+$29 for WiFi) $99-$399 $300+
WiFi Attacks βœ… Native ⚠️ With addon βœ… Specialized ❌
Bluetooth βœ… BLE 5.0 βœ… BLE ❌ ❌
Display βœ… Color LCD βœ… Monochrome ❌ Web UI ❌
Sub-GHz Radio ❌ βœ… ❌ ❌
NFC/RFID ❌ βœ… ❌ βœ… Specialized
Infrared ❌ βœ… ❌ ❌
Open Source βœ… βœ… βœ… βœ…
Pocket Size βœ… (50mm) βœ… ⚠️ Varies βœ…
Web Installer βœ… ❌ ❌ ❌
Battery USB-C Power βœ… Built-in ⚠️ Varies USB Power
Target Users WiFi/BLE Research Multi-Protocol WiFi Pentesting RFID Research

πŸ› οΈ Technical Architecture

graph TD
    A[ESP32-S3] -->|SPI| B[1.47" LCD]
    A -->|WiFi| C[2.4GHz Networks]
    A -->|BLE| D[Admin Console]
    A -->|GPIO| E[RGB LED]
    A -->|SPI| F[SD Card]
    D -->|Python| G[Cross-Platform GUI]
    C -->|Scan| H[Network Data]
    H -->|JSON| D
Loading

πŸ“š Documentation


🌟 Community


πŸ™ Acknowledgments


βš–οΈ Legal Disclaimer

IMPORTANT: This tool is designed for legitimate security research and testing on networks you own or have explicit permission to test.

  • ⚠️ Unauthorized network scanning or attacks are illegal
  • ⚠️ Users are responsible for complying with all applicable laws
  • ⚠️ We are not responsible for misuse of this tool
  • βœ… Only use on networks you own or have written permission to test

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.


Made with ❀️ by the MCT2032 Community

Star History Chart

If you find this project useful, please consider giving it a ⭐!