PORTAL.HACK Firmware
Firmware for advanced security tests on M5StickC Plus and M5StickC Plus 2 ESP32 Devices
BUY COMPLETE FIRMWARE ⬇️
✅SHOP: Buy Now
Important: By scrolling down, you will find a comprehensive description of the firmware, including all its detailed functions, along with the official product user manual.
FIRMWARE BY @MASTERBUDZ_REAL
PORTAL.HACK FIRMWARE FOR M5StickC Plus and M5StickC Plus 2
PORTAL.HACK is an intriguing firmware project developed for M5StickC Plus and M5StickC Plus 2, created to explore the capabilities of ESP32 development with the Arduino IDE. This firmware incorporates various advanced features for educational and experimental purposes.
Features:
1. Bluetooth (BLE) Attacks
- BLE-HACK: Spam of Bluetooth Low Energy devices.
- BLE-FASTSPAM: Rapid spam of BLE devices, constantly sending notifications.
- BLE SCAN: Scanning Bluetooth Low Energy networks and displaying devices.
- BLE WIN BAD-USB: Executing BadUSB attacks on Windows PCs via Bluetooth.
- BLE RUBBERDUCKY: Executing Rubber Ducky attacks via Bluetooth.
- nRF24 JAM: Jamming Bluetooth devices using the nRF24 antenna.
- EXFILTRATE CORP.: Extracting system information from Bluetooth devices.
- IOS-CRASH: Crashing or disrupting iOS devices via Bluetooth.
- ANDROID-CRASH: Crashing or disrupting Android devices via Bluetooth.
2. Wi-Fi Attacks
- WIFI-HACK: Attacking Wi-Fi networks by exploiting protocol vulnerabilities.
- WIFI PCAP FILE SAVE: Saving Wi-Fi packets in PCAP format for analysis.
- PORTAL.ino - Wi-Fi Function: Fake Wi-Fi hotspot for social engineering attacks and credential harvesting.
3. RF Device Attacks
- RF SIGNAL JAM: Jamming RF signals.
- RF REMOTE JAM: Web-controlled device for disrupting RF signals.
- RF GRABBER: Capturing RF signals.
- RF REPLY: Replaying captured RF signals.
- RF SCANNER: Scanning RF signals.
- RF RECORD: Recording RF signals.
- RF REC-REPLY: Replaying recorded RF signals.
- RF COPY-RAW: Copying raw RF signals.
- RF SEND-RAW: Transmitting raw RF signals.
- RF SUB SEND: Sending RF signals from .sub files.
- RF FILE-SAVE: Saving RF signals to SD card.
- RF CUSTOM REPLY: Custom response to RF signals via web interface.
- RF AUDIO JAM: Jamming audio signals transmitted via RF.
- CC1101 GRAB: Capturing RF signals using the CC1101 antenna.
- CC1101 REPLY: Replaying captured signals using CC1101.
- CC1101 SCANNER: Scanning RF signals in real-time using CC1101.
- CC1101 JAMMER: Using CC1101 to jam radio signals.
- TESLA PORT OPEN: Opening Tesla charging ports.
4. Infrared (IR) Attacks
- IR-BRUTE: Brute-force attacks on IR remote control systems.
- IR LEARN: Learning and saving IR signals.
- IR SEND: Sending copied IR signals.
- IR SCANNER: Scanning IR signals in real-time.
- IR FILE-SAVE: Saving IR signals to SD card.
- IR CUSTOM REPLY: Sending custom IR signals via web interface.
- IR DATA SCAN: Scanning and displaying IR data.
- TRAFFIC LIGHTS IR: Manipulating traffic lights via IR signals.
- NIGHT-CAMERA JAM: Jamming night vision cameras via IR signals.
5. Brute Force on RF Devices
- RF DEVICE BRUTE: Brute-forcing RF devices to identify access codes.
- RF LIGHTS BRUTE: Brute-forcing RF-controlled lighting systems.
- PARKING GATE BRUTE: Brute-forcing parking gate systems.
- CEILING FAN BRUTE: Brute-forcing RF-controlled ceiling fans.
- DEBRUIJN BRUTE: Brute-force attack using De Bruijn algorithm.
- CAME 12bit BRUTE: Brute-forcing CAME 12-bit systems.
- CAME 24bit BRUTE: Brute-forcing CAME 24-bit systems.
- LINEAR 10bit BRUTE: Brute-forcing linear 10-bit systems.
- PRINCETON 24bit BRUTE: Brute-forcing Princeton 24-bit systems.
- KEELOQ BRUTE: Brute-forcing KeeLoq systems.
- NICE FLO BRUTE: Brute-forcing Nice Flo systems.
- HOLTEK BRUTE: Brute-forcing Holtek systems.
- RESTAURANT RATEKESS PAGERS BRUTE: Brute-forcing Ratekess restaurant pagers.
- PT-2240 BRUTE: Brute-forcing PT-2240 systems.
- UNILARM 25bit BRUTE: Brute-forcing Unilarm 25-bit systems.
6. NFC and RFID Attacks
- NFC SCANNER: Scanning NFC cards and displaying UID.
- NFC DOOR BRUTE: Brute-forcing NFC door systems.
- RFID FASTBRUTE: Fast brute-force on RFID (Mifare) systems.
- RFID SLOWBRUTE: Slow brute-force on RFID (Mifare) systems.
- MIFARE UNLOCK: Replay function for RFID brute force attacks.
- CLONE RFID TAG: Full cloning of RFID cards.
- REPLY RFID TAG: Replay data from an RFID card.
- COPY RFID UID: Copying the UID of an RFID card.
- REPLAY RFID UID: Replaying the UID of an RFID card.
- EMULATE TAG: Emulating a cloned RFID card.
7. Specific Device Attacks (Others)
- SHOP CART UNLOCK: Unlocking smart supermarket shopping carts.
- SAFE UNLOCK: Unlocking safes using the Flipper Zero SentrySafe method.
8. Security and Utility Functions
- DETECT SKIMMERS: Detecting skimmer devices to ensure card security.
- DETECT PWNAGOTCHI: Detecting Pwnagotchi devices.
- DETECT FLIPPERZERO: Detecting other Flipper Zero devices.
- EMP GENERATOR: Generating electromagnetic pulses (EMP) for testing.
- GPS INFO: Displaying GPS information such as location and altitude.
- SOUND NOISE: Emitting annoying sounds to disrupt or alert.
- LED LIGHT: Controlling an LED for visual effects or indications.
9. Simulations and Extra Features
- TAMAGOTCHI: Simulating a virtual pet like a Tamagotchi.
- WEB LINKS: Quick access to web resources for hacking.
- SETTINGS: Accessing the device's configuration menu.
*Note: These functionalities may interact with various devices, including gates. Please use responsibly and in compliance with applicable laws and regulations.*
PORTAL.ino - Wi-Fi Function
In PORTAL.HACK Portal mode, an open WiFi Hotspot named "Vodafone Free WiFi" (configurable by clone another AP) is activated. It serves a fake login page for social engineering attacks, capturing entered usernames, passwords, emails, and OTPs. Cloning existing SSIDs is possible from the WiFi Scan details. Captured credentials can be viewed by connecting to the portal and browsing to http://172.0.0.1/creds. Custom SSIDs and settings can be configured in a similar manner. SD Card support logs usernames and passwords to portal-hack-creds.txt.
Note: PORTAL.HACK is intended for professional engagements, education, or demonstration purposes only. Unauthorized use of personal information is against the law.
RF SIGNAL DECODE & REPLAY
The PORTAL.HACK Firmware includes a powerful feature that decodes and stores various types of RF signals, including those from vehicle remotes, for replication. This functionality is particularly valuable for capturing and replaying RF signals from car remotes or other RF devices for testing and security analysis.
Key Capabilities:
- Decoding RF Signals: The firmware can intercept and decode RF signals from a wide range of devices, including vehicle remotes, allowing you to understand the signal structure and content.
- Storing RF Signals: Once decoded, the RF signals can be stored for later use. This enables you to build a library of signals for different devices, which can be invaluable for testing and research purposes.
- Replicating RF Signals: Stored RF signals can be replayed to replicate the original transmission. This is useful for testing the security of RF-based systems, such as car remotes, garage doors, and other RF-controlled devices.
- Security Testing: By capturing and analyzing RF signals from vehicle remotes and other devices, you can identify potential vulnerabilities and weaknesses in the RF communication protocols. This information can be used to improve the security of these systems.
This feature is designed for professional engagements, education, and demonstration purposes. It provides a robust toolset for those involved in security testing and research, ensuring that RF-based systems are thoroughly evaluated for potential risks.
Note: Please use this functionality responsibly and in compliance with applicable laws and regulations.
Discord Community
Join our Discord community for support, updates, and discussions!
GLOBAL SHOP:
Buy complete firmware with all described functions here
OTHER RESELLERS:
Coming soon...
Installation Tutorial:
Firmware Review:
⚠️ Make sure there are 2 coils on the FS1000A transmitter for proper functionality.
Additional Modules:
RF Transmitter Pinout:
RF Receiver Pinout:
CC1101 Pinout:
nRF24 Pinout:
INFRARED Transmitter Pinout:
INFRARED Receiver Pinout:
SD CARD PINOUT
IR BLASTER
RFID2 READER
The IR Blaster is an advanced device that allows infrared (IR) signals to be sent over long distances.
⚠️ IMPORTANT NOTICE ⚠️
Please be advised: Do NOT download or install any copies of software or firmware that are not from official sources. There have been reports of fake cracks circulating that contain malware. These malicious downloads can seriously compromise your security.
This malware is designed to inject a backdoor into your PC, giving attackers unauthorized access to your system. The fake crack might appear to work only for those who have purchased the software, because their HWID is actually active in the original firmware. However, using these copies still poses a significant threat.
Protect your devices and data by avoiding these dangerous copies and always verify your downloads from trusted sources.
Stay safe and vigilant.
Thank you for your attention!