Setup Your Own ESP8266-Based WiFi Deauther

Rajan Kumbhani

Nov 18, 2022

2 Min


  1. About ESP8266 Deauther

About ESP8266 Deauther

The ESP8266 is a low-cost Wi-Fi microchip, with built-in TCP/IP networking software, and microcontroller capability. It’s an open-source pen-testing tool.

Now we see how to make Owen ESP8266 Daughter device. In this project, we used device ESP8266 NodeMCU v1.0.

Step 1: First of all if you don’t have Arduino IDE then first download it because we need it for programming. Open Arduino IDE and go to File → Preferences or Press Ctrl+Comma.

Step 2: Click on Additional boards manager URLs.

Step 3: Past the following URL on the text box and click on the OK button



Step 4: Now go to Tools → Board → Boards Manager or press Ctrl+Shift+B.

Step 5: Search esp8266, and install Deauther ESP8266 Boards and esp8266 to add support for the board to your Arduino IDE.

Step 6: Now plugin the device and go to Arduino IDE Board → Deauther ESP8266 Boards → DSTIKE Deauther(if you getting a problem detecting the device).

After all, this, let’s download the code onto the ESP8266-based Deauther board. Clone the repository with the command below, and then move the “esp8266_deauther” folder into your “Arduino” folder.

~# git clone

after downloading the code now upload it on the ESP8266 device.

Step 7: Now select wifi k1llu4 and connect it, then open the browser and go to or

Step 8: Select the router you want to attack and click on the Attacks button.

Step 9: There is three types of option Death, Beacon, and Probe.

Deauth: This will attack any network in range, disabling Wi-Fi until you disable it. It’s worth noting that you’re connected to the device via Wi-Fi, which means you could unintentionally prevent yourself from connecting to the device in order to turn it off. If you find yourself disconnected and unable to reconnect, you may need to unplug the board to stop it.

Beacon: This attack will generate up to a thousand fake networks, either by cloning nearby networks or by creating entirely new ones.

Probe: In this case, the board will send probe requests for a network name from the list you specify. Some Wi-Fi trackers will be confused, and some Wi-Fi attack tools will create fake networks in response to the network names contained in the probe requests.

Rajan Kumbhani
Rajan KumbhaniProfessional Service Manager

Rajan Kumbhani, distinguished cybersecurity professional excelling in web app penetration testing and IoT. Project Manager at Certbar Security, passionate about community initiatives in Seaside Goa.