Skip to main content
ESP32-C6 Total Destruction Mode is an educational security demonstration project that uses the ESP32-C6 microcontroller to remotely trigger destructive actions on a target Windows machine over Wi-Fi. It is designed exclusively for authorized lab testing on dedicated test machines in isolated, controlled environments.
This project is intended solely for educational and authorized security research purposes. Never run this code on your own computer or any machine without explicit authorization. All data on the target machine will be permanently lost.

Introduction

Understand the project architecture, operational modes, and safety requirements before you begin.

Hardware Requirements

ESP32-C6 specifications, GPIO pinout, and everything you need to get the hardware ready.

Arduino IDE Setup

Install board support, required libraries, and flash the firmware for Station or AP mode.

Python Environment

Configure the Windows listener script and package it as a standalone executable.

Station Mode

Connect the ESP32 to an existing lab Wi-Fi network and trigger commands remotely.

AP Mode

Run the ESP32 as a standalone hotspot for fully isolated lab demos.

API Endpoints

HTTP endpoints exposed by the ESP32 web server for control and status polling.

Troubleshooting

Solutions to common connectivity, permission, and hardware issues.

How it works

The ESP32-C6 runs a lightweight HTTP web server and exposes a small set of endpoints. A Python listener script runs on the target Windows machine, continuously polling the ESP32 for a SIL (delete) signal. When the signal arrives — triggered by visiting a URL from any browser on the same network — the listener executes a sequence of destructive system commands.
1

Flash the ESP32

Upload the Arduino sketch for your chosen mode (Station or AP) to the ESP32-C6 board.
2

Run the listener

Launch the Python listener script on the target Windows machine as Administrator.
3

Connect and trigger

Connect a phone or browser to the ESP32’s web interface and press the trigger button.
4

Observe the result

The listener receives the SIL command and executes the configured destructive sequence.

Build docs developers (and LLMs) love