pr3y / bruce_old

M5 Cardputer firmware for offensive pranks
Other
157 stars 18 forks source link
bruce cardputer esp32-s3 m5stack

:no_entry: [DEPRECATED] Active at https://github.com/pr3y/Bruce


M5-Bruce

Firmware for offensive pranks to Cardputer

Bruce ~thx Luidiblu for the image

Name and Background

Forked project, same intentions B) NEMO started a personal project to help me learn more about ESP32 development with the Arduino IDE. I decided to replicate a few common, trending pranks that were getting a lot of attention in the tech community, as a challenge to myself, and to also better understand these attacks.
NEMO is named after the small, clever and stubborn fish in Finding Nemo. This project stands in contrast to another high-tech gadget that's associated with certain sea-dwelling creatures. I did want to prove that there are a lot of things you can do with a small development kit and some curiosity. I have no delusions of superseding the capabilities of any similar device with this project. It's just for fun, and my own education.

Hello, my name is Bruce.

M5Cardputer

M5Cardputer Main Screen

M5Cardputer Wifi Attacks

Features

User Interface

There are three main controls:

EVIL Portal

In EVIL Portal mode, BRUCE reads the keyboard input for the SSID and activates a open WiFi, with DNS, DHCP and Web servers activated.

BadUSB

NOW BRUCE PARSE PAYLOADS LIKE FLIPPER!!

Now only DuckyScript payloads are supported!! for more info on creating your own DuckyScripts read here

To choose a payload for the BadUSB on Cardputer instead of getting rickrolled, you need to create a file on the SD card root directory ending with ".txt". You can then select which payload that will be sent when the Cardputer is connected via USB cable.

Wireguard

To be able to connect to a wireguard tunnel with your cardputer easily, you need to have your .conf file and place on the SD card root directory called "wg.conf".

Openhaystack

Now its possible to use the cardputer as a AirTag! thanks to Openhaystack.

To make it work, you should get your Public key encoded with base64 and save it on a file on the SD root called "pub.key". To create pub.key file you should run this in bash:

base64 -d <<< "your_base64_public_key"|tee pub.key

NFC / RFID

It is now possible to use the M5Stack RFID2 (WS1850S) to read and write Mifare Classic cards and tags. From what we investigated, this device does not allow emulation, so we recommend that you use an adhesive NFC tag on your Cardputer. New functions involving NFC will be developed in the coming seasons.

To use, simply access the NFC / RFID menu, approach the card to which it will be read, press "ENTER" and approach the card to which it will be written. To exit, press "ESC". Languages ​​in English and Brazilian Portuguese and some error messages were inserted.

By: @IncursioHack

NFC

Install from M5Burner

This is the absolute easiest way to get BRUCE

Install .bin files manually with esptool.py

Building from Source

If you want to customize BRUCE or contribute to the project, you should be familiar with building BRUCE from source.

Troubleshooting

Contributing

Contributions are welcome. Please look at the GitHub Issues for ideas to help enhance the project. When submitting a Pull Request, please target the develop branch. The easiest way to do this is to fork ALL branches, or to simply create a "develop" branch in your own fork, then use GitHub to Sync your develop branch. Take note of how certain hardware (like the LED and RTC) are defined and gated in the code and try to stick to those patterns.

Things I'd like help on:

Things I probably won't merge in:

References

https://github.com/spacehuhn/ArduinoPcap

https://github.com/n0xa/m5stick-nemo

https://github.com/m5stack/M5Cardputer

https://github.com/caioluders/DPWO

https://github.com/seemoo-lab/openhaystack/tree/main/Firmware/ESP32