Blueprint

WebSec-Marauder-Guardian

Marauder is an ESP32 based defensive cybersecurity prototype developed to educate students and ethical hackers about how wireless threats can be detected and mitigated safely. It passively monitors Wi-Fi and Bluetooth signals to demonstrate threat awareness not exploitation helping learners understand how attacks like deauthentication, spoofing, and rogue access points occur and how to secure against them. All offensive functions (jamming, spamming, impersonation) are explicitly disabled, making this a 100% legal, educational, and defensive device. The project aims to promote ethical cybersecurity awareness at hackathons and college tech events. Built using: ESP32-DevKitC-32UE, TFT LCD Touch Display, LiPo Battery, TP4056 Charger, Rocker Switch, Wi-Fi/Bluetooth Antenna, and custom 3D-printed casing. Purpose: To help students see, not attack — a visual, real-time way to study wireless behavior and improve security understanding.

Created by Code With Mehru Code With Mehru

Tier 3

4 views

1 follower

Timeline

technical_. technical_. requested changes for WebSec-Marauder-Guardian ago

Pictures for journaling is required, please add pictures to your "journal list". In addition, this does not warrant a tier three. As said before, you are only connecting modules together, and most of the complexity is in the code. Either increase hardware complexity, or adjust your grant amount/tier. If this is not fixed in the next submission, your project can be permanently rejected.

Code With Mehru Code With Mehru submitted WebSec-Marauder-Guardian for review ago

Code With Mehru Code With Mehru added to the journal ago

Designed WebSec Marauder Guardian schematic circuit

This week I completed the full schematic design for the WebSec Marauder Guardian hardware using Proteus 8. The diagram shows all wiring between ESP32, power circuit, sensors, and the LCD module. It represents how each component connects logically for the actual build. The schematic ensures stable power delivery and clear signal routing before PCB manufacturing. The uploaded image is a functional reference showing my wiring logic and hardware planning. I plan to move this schematic into a custom PCB design next, integrating all parts into a single board for compact assembly. This step increases the overall hardware complexity and validates the complete connection workflow. Everything is now structured for final testing and optimization.wiring-diagram

technical_. technical_. requested changes for WebSec-Marauder-Guardian ago

This does not have enough hardware complexity to be a tier three. You are simply stitching/wiring modules together, and this is mostly code based. Please either increase hardware complexity, or optimize your BOM to fit a tier four.

Code With Mehru Code With Mehru submitted WebSec-Marauder-Guardian for review ago

Code With Mehru Code With Mehru added to the journal ago

WebSec Marauder Guardian — Development Journal

Day 1 (Project kickoff & research)

  • Researched defensive vs offensive Wi-Fi tools and legal/ethical considerations.
  • Collected references on passive Wi-Fi scanning, BLE sniffing, and signal analysis.
  • Decided to keep project strictly passive and educational; documented ethics in README.
  • Created initial project outline, scope, and success criteria. Time spent: 12 hours

Day 2 (BOM & parts selection)

  • Surveyed vendors (Amazon, Robu) for ESP32 boards, TFT displays, LiPo, chargers, antenna, buzzer.
  • Compiled BOM.csv and optimized costs; added notes on parts I already own vs planned purchases.
  • Chose ESP32-DevKitC-32UE for BLE + Wi-Fi dual support and ILI9341 TFT for visualization. Time spent: 10 hours

Day 3 (Mechanical design & 3D case)

  • Modeled case layout concept (dimensions, mounting points) in Fusion360 / CAD.
  • Exported STL for front/back case and iterated on fastening points and ventilation.
  • Rendered a prototype image for repo documentation (placeholder image used). Time spent: 18 hours

Day 4 (Wiring diagrams & prototyping plan)

  • Drew wiring-diagram.png showing connections: ESP32 SPI → TFT, TP4056 → LiPo, buzzer, switch, SD module.
  • Added notes on pin choices, voltage rails, JST connector recommendations, and safety.
  • Planned breadboard test steps and required tools (soldering, JST crimp). Time spent: 10 hours

Day 5 (Firmware architecture & module design)

  • Designed firmware modular structure: wifiscanner, btscanner, display, logger, gps, ota.
  • Wrote API/CLI plan for logging format and HTTP upload schema (fields: timestamp, ssid, bssid, rssi, channel, gps).
  • Prepared PlatformIO/Arduino structure and dependencies list. Time spent: 23 hours

Day 6 (Passive scanning experiments)

  • Ran local experiments with ESP32 example sketches (WiFi.scanNetworks, BLEScanner) on devboard I have (or simulated).
  • Measured timings and power draw; recorded sample outputs and filtered noisy SSIDs.
  • Determined appropriate scan interval (tradeoff between battery and detection latency). Time spent: 16 hours

Day 7 (Logging & data format)

  • Created CSV/JSON log schema for SD and HTTP upload. Example entry: ts,ssid,bssid,rssi,chan,gps_lat,gps_lng.
  • Wrote logger pseudo-code and SD rotation policy (max file size, daily logs).
  • Planned secure upload: HTTPS + token-based auth (no plaintext). Time spent: 16 hours

Day 8 (Safety, ethics, and documentation)

  • Expanded README safety section; explicitly marked all offensive features as DISABLED.
  • Wrote testing policy: only test on owned/permissioned networks, record consent.
  • Added image disclaimer in README and updated journal. Time spent: 8 hours

Day 9 (UI/UX: display & alerts)

  • Designed on-screen UI for TFT: status bar, top N SSIDs, RSSI bar graph, alert banner.
  • Decided buzzer behavior for passive alert thresholds (short beep for new unknown AP, longer for suspicious spike).
  • Sketched CLI commands for querying logs and setting thresholds. Time spent: 15 hours

Day 10 (Roadmap, testing plan & next steps)

  • Compiled final roadmap: purchase parts, assemble prototype, run controlled tests, publish firmware v0.1.
  • Created test plan (lab tests, field tests, consent forms) and checklist for submission.
  • Prepared files to push to repo (firmware skeleton, BOM, wiring, journal). Time spent: 12 hours

Total time invested: 144 hours


Notes:

  • The uploaded image in the repo (3D Prototype.png) is a downloaded reference prototype to visualize how the final build will look. Once physical components arrive and the assembly begins, actual device photos will be uploaded.
  • Firmware and documentation are developed from scratch for educational and ethical demonstration of Wi-Fi safety.
  • The design showcases a secure and educational replica for hackathon participants to understand wireless threats responsibly. 3D Prototype

Code With Mehru Code With Mehru added to the journal ago

Updated WebSec Marauder Guardian Journals

This week, I finalized the WebSec Marauder Guardian firmware modules and updated the LICENSE for open-source compliance. I refined the journal with detailed progress logs and improved documentation for better understanding of the ESP32 hardware workflow. The uploaded image is a reference prototype — actual photos will be added once components arrive. Firmware and wiring were optimized for performance and modularity. The project is now well-documented, stable, and ready for hardware assembly and testing.3D Prototype

technical_. technical_. requested changes for WebSec-Marauder-Guardian ago

Little to none journaling for an extreme amount of hours. Please add more journals describing your thought/design process.

Code With Mehru Code With Mehru submitted WebSec-Marauder-Guardian for review ago

Code With Mehru Code With Mehru added to the journal ago

Designed the Marauder prototype & documented features

WebSec Marauder Guardian is an ESP32-based defensive wireless monitor for teaching passive Wi-Fi/BLE detection and network safety. The repo documents design, BOM, and planned firmware. The prototype image shown is a downloaded placeholder; I will replace it with in-hand photos and purchase receipts once components arrive and testing completes successfully.3D Peototype

Code With Mehru Code With Mehru started WebSec-Marauder-Guardian ago