AWOK Dual Touch V3 · Volume 1

AWOK Dual Touch V3 — Module Deep Dive

Hardware, firmware comparison (Marauder vs Ghost ESP vs Bruce), install procedures, standalone operation, mods, and legal posture

A reference and decision aid for the AWOK Dynamics Dual Touch V3 — third-party dual-ESP32 wardriving / Wi-Fi audit module for the Flipper Zero.

Scope. Catalog-style coverage already lives in the Flipper Zero Vol 9 third-party-modules series (§ 2.3). This document is a comprehensive, standalone reference focused on what to buy, what to flash, and how to operate the board. Most of its bulk is the firmware comparison and install-procedure section, because that is the live decision tjscientist is making.

1. About this document

The AWOK Dual Touch V3 is a third-party Flipper Zero accessory. It mounts on the Flipper’s 18-pin GPIO header, but it can also run standalone powered from one of its two USB-C ports — that dual-mode operation is its defining trait. Two ESP32-WROOM modules and a resistive touchscreen turn it from “another GPIO board” into a self-contained handheld Wi-Fi auditor.

The board is a development platform, not a productized appliance: AWOK ships it with no firmware, and you pick what to install. The choice of firmware is what determines the personality of the board, and the choice matrix is non-obvious. This document’s center of gravity is therefore § 5 (“Firmware options — the comparison”), § 6 (“Install procedures”), and § 7 (“Operating the firmware”).

Convention reminder. This deep dive is module-scoped, not tool-scoped. The umbrella Flipper Zero deep-dive (Vols 1–12 in 03-outputs/html/) treats AWOK as one entry in a large catalog. This file does the opposite: it treats the AWOK as the centerpiece and treats the Flipper as one possible host.


2. Identity, lineage, and “what’s in the box”

Maker. AWOK Dynamics (US). “AWOK” is the founder’s handle, not an acronym. Direct sales at awokdynamics.com. EU distribution via Lab401. Reseller listings exist on Tindie (“Unlimited Coverage” / ucshop) and at Virtus Fab.

Product family. AWOK Dynamics’ Flipper-add-on lineup currently includes the Dual Touch (V1 → V2 → V3 progression) and the Dual Mini (smaller, no touchscreen). This document is exclusively about the Dual Touch V3. V2 still sees community use but is mechanically and electrically different; binaries are not interchangeable (see § 3.5).

The “Dual Touch” name refers to the two distinguishing traits of this generation: (a) dual ESP32-WROOM modules on a single PCB, and (b) an on-board resistive touchscreen. It is not a reference to a specific touch-IC architecture. Earlier marketing copy and forum posts sometimes imply a high-end capacitive touch matrix — that is incorrect, see § 3.3.

In the box (stock V3).

  • One Dual Touch V3 PCB with two ESP32-WROOMs, ILI9341-class TFT, internal GPS, antenna SMA jacks, and 18-pin Flipper-header pad
  • Clear ABS slide-on case (transparent — light-pipes the status LEDs)
  • Two 2.4 GHz external SMA Wi-Fi antennas (small dipole “rubber ducky” pattern — short, omnidirectional)
  • USB-C cable (sometimes — varies by reseller and revision)

Not in the box. No external GPS antenna (board uses an internal ceramic patch — see § 3.4), no firmware (must be flashed — see § 6), no documentation beyond a card pointing at AWOK’s product/FAQ pages.

Buy-decision bottom line. The V3 sits in the $140–$180 price band depending on seller and stock state. The closest direct competitors are the Apex 5 (ESP32-C5, dual-band Wi-Fi 6, similar price) and the FlipMods Combo. AWOK V3’s distinguishing pitch over both is the on-board touchscreen (fully standalone operation) and the dual-ESP architecture (one for screen UI, one for the Flipper-side bridge — they can run independent firmwares). Apex 5 wins on radio modernity (5 GHz Wi-Fi 6). FlipMods Combo wins on price and triple-radio integration. AWOK V3 wins when you want a handheld Wi-Fi auditor that doesn’t need a Flipper to be useful.


3. Hardware reference

This section is a schematic-grade walk-through. The board has been around long enough that its identity is stable, but a couple of facts in circulation are wrong (see § 3.10), so I’m being explicit.

3.1 Block diagram (architectural)

         ┌───────────────────────────────────┐
         │          AWOK Dual Touch V3       │
         │                                   │
         │  ┌──────────────┐                 │
SMA ──┐  │  │ ESP32-WROOM  │  USB-C (white)  │
      ├──┼──┤  "Screen"    ├─────[ flash ]──►│
SMA ──┘  │  │  ILI9341 TFT │                 │
         │  │  XPT2046 TS  │                 │
         │  └────┬─────────┘                 │
         │       │ shared GPS UART (DIPs)    │
         │  ┌────┴─────────┐                 │
         │  │  GPS module  │ internal patch  │
         │  │  (u-blox-cls)│ antenna         │
         │  └────┬─────────┘                 │
         │       │                           │
         │  ┌────┴─────────┐  USB-C (orange) │
         │  │ ESP32-WROOM  ├─────[ flash ]──►│
         │  │  "Flipper"   │                 │
         │  │  UART bridge │                 │
         │  └────┬─────────┘                 │
         │       │                           │
         └───────┼───────────────────────────┘

        18-pin GPIO header (mates to Flipper Zero)

Two ESPs share only the GPS UART through a DIP-switch matrix (§ 3.4). They do not share SPI or I²C, and they do not talk to each other directly — they’re effectively two parallel Wi-Fi/BLE radios with one optional GPS feed each.

3.2 The two ESP32-WROOMs

Both chips are ESP32-WROOM-class modules. Each has its own:

  • 4 MB internal flash (typical WROOM-32 SKU)
  • USB-UART bridge (Silicon Labs CP210x or CH340C, varies by batch — driver matters for the host machine; see § 6.2)
  • Boot-strap pins routed to the user-accessible BOOT/RESET buttons on the PCB. Pressing-and-holding BOOT while pressing RESET drops the chip into the ROM bootloader — that’s how you flash it.

The two chips are not interchangeable at the firmware level. Even though both are WROOMs, their bootstrap config and UART routing differ between the screen-side and the Flipper-side, and firmware images are specific to each port (see § 5 and § 6).

Documentation drift. Several older AWOK product pages and Tindie listings describe the Flipper-side ESP as an ESP32-S2-WROVER. That matched some V3 batches but not the current production. The reliable test is to read the silk on the metal can directly. If it says “ESP32-WROOM-32”, use the WROOM binaries; if it says “S2-WROVER”, you’ve got a transitional batch and must use the older binary names. Marauder’s V2 binary for that port (..._flipper.bin) was retained partly to support those transitional boards.

3.3 The display and “touch”

  • Display: 2.8” SPI TFT-LCD, ILI9341 controller, 320×240 RGB565, resistive touch overlay. Orientation rotated 90° so the long axis is vertical when the board is held like a phone.
  • Touch IC: XPT2046 — a four-wire resistive ADC controller. Not capacitive. Earlier theories about TT21100 / GT911 / CY8CMBR3110 capacitive ICs are wrong.
  • Implication: Touch is single-point, pressure-actuated, and the layer is exposed as a separate SPI peripheral on the screen-side ESP. It needs a stylus or fingernail tip pressure — not a flat pad. Marauder’s UI is designed around this and uses oversized touch zones; Ghost ESP and Bruce, where ported, are designed for capacitive touch and feel sluggish.
  • Bezel-edge issue. The clear ABS case bezel can press the very edge of the resistive layer hard enough to register a constant “down” near a corner. Symptom: lists auto-scroll without input. Documented fix: shave ~0.3 mm off the inside of the case bezel where it contacts the screen border. AWOK acknowledges this in their FAQ.

3.4 GPS subsystem

  • Receiver: u-blox-class GPS module (specific part number varies by batch; common candidates are NEO-6M and ATGM336H from clone u-blox). Outputs NMEA at 9600 baud over UART by default.
  • Antenna: internal ceramic patch antenna on the PCB. No external GPS antenna in the box. The SMA jacks on the side are for Wi-Fi, not GPS. There is no factory-fitted u.FL GPS pigtail to bring out.
  • DIP-switch GPS routing. A small DIP-switch block (typically 2-position) on the back of the PCB controls which ESP receives GPS NMEA. Three useful settings:
    • GPS → Screen ESP only
    • GPS → Flipper-side ESP only
    • GPS → both ESPs in parallel (UART tee)
  • Cold-fix performance. Cold fix in clear sky: 30–90 s typical. Cold fix indoors near a window: usually never (the patch antenna has poor out-of-window sensitivity and no LNA). Plan an external active antenna mod if you intend serious wardriving — § 10.

3.5 V2 vs V3 hardware diff

The V3 introduced two non-trivial board changes:

  1. Flipper-side ESP boot/UART routing changed to match the “Marauder Dev Board Pro” reference design. This is why Marauder ships a distinct binary for the V3 flipper port (..._marauder_dev_board_pro.bin) versus the V2 flipper port (..._flipper.bin). Crossing them will brick nothing but will refuse to boot or will boot with broken Flipper UART.
  2. Touchscreen mounting / bezel changed to address the V2’s touch-glitch issue. V3 reduces but does not eliminate it.

The screen-side binary (..._v6_1.bin) is the same on V2 and V3 because the screen-side hardware is unchanged. Always think of “V2 vs V3” as a Flipper-side-only distinction.

3.6 RF: antennas and front-ends

  • Two 2.4 GHz Wi-Fi antennas via SMA jacks on the side. Each ESP has its own antenna path — one chain to the screen ESP, one to the Flipper-side ESP. They are not combined or diversity-switched. Each ESP’s onboard radio uses one antenna.
  • No 5 GHz support. Both ESP32-WROOMs are 2.4 GHz only — by silicon, not by firmware. If you need 5 GHz Wi-Fi auditing, you want the Apex 5 (ESP32-C5) instead.
  • No NRF24, no CC1101, no LoRa. Despite some confused listings, the Dual Touch V3 is Wi-Fi/BLE only, plus GPS. The “Dual” in the name is about the two ESPs, not about dual-band radio.

3.7 Power

  • USB-C inputs: two — one per ESP. Either or both can power the board.
  • Flipper 3V3 rail: the board can be powered from the Flipper’s 3V3 GPIO pin alone, but AWOK’s own FAQ recommends external USB-C for any serious work because two ESPs running Wi-Fi peaks well above the community-rated ~150 mA continuous limit on the Flipper rail.
  • GPS + screen + dual ESP at full pelt is 150–400 mA average with transient peaks well over 500 mA during Wi-Fi TX bursts. Plan to power via USB-C (or via the official battery backpack, see § 8).
  • AWOK Dynamics’ “Dual Board Battery Backpack” ($37) is the vendor’s answer for true handheld standalone operation — BYO 3.7 V 1S LiPo cell in a screw-on case with integrated over-charge / over-discharge protection. Full discussion in § 8.
  • 3D-printed community shells with sandwiched LiPo + boost converter exist on Printables / Thingiverse and predate the official backpack; they remain a valid DIY route.

⚠ Power-input topology hazard — unverified. AWOK Dynamics publishes no schematic for the V3, and no public teardown documents how the three power sources (USB-C #1, USB-C #2, Flipper 3V3 via GPIO header, and now the battery backpack’s JST-PH2.0 input) are combined on the PCB. Diode-ORing, power-input selection switching, and protection against back-feeding into the Flipper’s 3V3 rail are all unconfirmed. Until the topology is verified — by asking AWOK Discord, scoping the 3V3 rail under each source independently, or reverse-engineering the PCB — do not connect more than one power source at a time. See § 8.4 for recommended verification procedure and a draft question to send AWOK support before mixing sources.

3.8 Storage

  • microSD slot — yes, on V3. Push-push holder at the top-center of the rear PCB, between the two USB-C ports. The slot is documented in AWOK’s FAQ but is not called out on the product-page bullet list (which is where the persistent “AWOK has no SD” community confusion comes from). The vendor specifies: ≤ 32 GB capacity, FAT32 format (not exFAT), SanDisk recommended, not hot-swappable — power-cycle the board after inserting or removing a card. AWOK also sells pre-formatted 16/32/64 GB AWOK-branded cards (the 64 GB option exists in the store despite the 32 GB limit — assume those are partitioned or relabeled).
  • What gets written there: PCAPs (sniffer / deauth / beacon / probe / EAPOL captures), WiGLE-format wardrive CSV (wardrive_*.csv), Evil Portal HTML assets, operator-supplied wordlists, raw log files. The SD is also the canonical exfil path off-device for downstream analysis (Wireshark, hashcat, wigle.net upload).
  • Marauder SD support landed in v1.8.4 (2025-08-06) and is current through v1.12.1. The “Marauder V6 / AWOK Dual Touch and Mini do not have SD card support” line that appears in earlier release notes was a pre-v1.8.4 limitation that has since been resolved — that line is the source of most documentation drift on this topic.
  • Ghost ESP SD support is missing on AWOK boards. This is a firmware- side gap, not a hardware gap — the Spooks4576 Ghost_ESP “Board-Specific Guide” wiki page states “Marauder V6 and AWOK variants: No SD card support.” See § 5.2 for what this means operationally.
  • Bruce SD support — Bruce has generic SD support but no AWOK-V3-specific build verified to write to it. Treat as unconfirmed until tested.

3.9 GPIO header (Flipper-facing)

The 18-pin header presents the standard Flipper GPIO footprint and primarily carries:

  • 3V3 power and ground (passes through to the board so the Flipper can power it if you really want)
  • UART TX/RX between the Flipper’s GPIO 13/14 and the Flipper-side ESP (this is the “bridge” path the Marauder companion FAP uses)
  • A small set of additional GPIOs for control signaling that varies by firmware

The screen-side ESP does not connect to the Flipper header. It is only flashable and operable via its own white-USB-C port.

3.10 Common misconceptions to clear up

MythReality
”Capacitive multitouch screen”Resistive single-point ILI9341 + XPT2046
”Has 5 GHz Wi-Fi”2.4 GHz only — both ESP32s are WROOM-32 class
”Has external GPS antenna”Internal ceramic patch only; SMAs are Wi-Fi
”Has no microSD slot”False — push-push holder at top-center between the USB-Cs; documented in AWOK FAQ; ≤ 32 GB FAT32; Marauder writes to it from v1.8.4 onward
”Can sniff NRF24”No — no NRF24 silicon on the board
”V2 and V3 binaries interchangeable”Screen-side: yes. Flipper-side: no.
”AWOK = acronym”No — the founder’s handle

4. What it can do (capability matrix)

Capabilities are mostly determined by firmware (§ 5). The table below captures the board-level ceiling — what the silicon allows, regardless of firmware. A given firmware exposes a subset.

CapabilityPossible on AWOK V3?Notes
2.4 GHz Wi-Fi scanning (probe / beacon / SSID)YesBoth ESPs
2.4 GHz Wi-Fi deauthYes, in firmware that allows itLegal: see § 11
Evil Portal / captive-portal phishingYesMarauder + Ghost ESP both ship it
BLE scanning + advertisingYesIncluding BLE spam in some firmwares
5 GHz Wi-FiNoHardware doesn’t have it
Sub-GHz (433/868/915 MHz)NoNo CC1101 onboard
NRF24 / 2.4 GHz mousejackingNoNo NRF24 onboard
GPS NMEA logging / wardrivingYesInternal antenna; expect outdoor only
WiGLE-format exportYes with Marauder ≥ v1.8.4Writes wardrive_*.csv to onboard SD (≤ 32 GB FAT32); upload to wigle.net
PCAP captureYes — to SDOnboard microSD with Marauder; Ghost ESP/Bruce currently flash-only on AWOK
Standalone (no Flipper) operationYesTouchscreen + USB-C power
Flipper-bridged operation (Marauder companion FAP)YesOrange-USB ESP runs the bridge firmware
Both at once (screen UI + Flipper UI)YesEach ESP runs its own firmware
Two-ESP cooperation (e.g. coordinated attack)LimitedThey share only GPS UART

5. Firmware options — the comparison

This is the core decision for a freshly-acquired V3. The board has no factory-installed firmware, and three firmware projects are realistic candidates as of mid-2026: ESP32 Marauder, Ghost ESP, and Bruce. A fourth path — building your own from Espressif’s IDF — is a serious-effort DIY route reserved for § 5.5.

5.1 ESP32 Marauder (justcallmekoko / upstream)

TL;DR. The default. The reference firmware. The one AWOK Dynamics assumes you’re running. Pick this one if you don’t know what you want.

Repo: github.com/justcallmekoko/ESP32Marauder

Project shape. Active since 2020. Single primary maintainer (justcallmekoko). Has a sizable issues backlog but releases ship regularly. Distribution: pre-built .bin files in GitHub Releases plus a project wiki of hand-written install steps. No package manager — you flash binaries.

Current version (mid-2026): v1.12.1 (released 2026-05-05). Notable recent cutoffs that matter for AWOK V3 specifically:

  • v1.8.4 (2025-08-06) — first release with microSD support on AWOK Dual Touch V3 and Dual Mini. Resolves the long-standing “no SD” community claim. PCAPs and wardrive_*.csv now write to the onboard SD if a card is present and SavePCAP is enabled in settings.
  • v1.12.0 — Fox Hunt (formerly Signal Monitor) became channel-hopping; AP-only scan was removed in favor of unified AP+Station scan; wardrive channel weighting rebalanced.
  • v1.12.1Apple Juice BLE-spam CLI command added; Flock Sniff (LPR-camera detection) gained channel-hop + OUI filter.

5.1.1 AWOK V3 binary mapping

This is the most important practical detail in this entire document — get it wrong and your board appears bricked even though it’s just refusing to boot a wrong-target image. The two ESPs are NOT pin-compatible across hardware revisions (V2 was an S2-WROVER, V3 is plain WROOM-32) — flashing a V2-era _flipper.bin to the V3 orange-port ESP bricks it and requires ROM-bootloader recovery to undo.

PortWhat it isMarauder binary (v1.12.1 names)
White USBScreen-side ESP-WROOM-32, drives the 2.4” touchscreen + GPSesp32_marauder_v1_12_1_v6_1.bin
Orange USBFlipper-side ESP-WROOM-32, UART-bridges to Flipper GPIO headeresp32_marauder_v1_12_1_marauder_dev_board_pro.bin

The _v6_1 suffix refers to Marauder display-chain version 6.1 (TFT_eSPI + XPT2046 stack). The _marauder_dev_board_pro suffix names the reference UART/headless platform whose boot routing the V3’s Flipper-side ESP mirrors.

The two ESPs on the V3 do not communicate with each other. They share power and the GPS antenna (DIP-switch-selectable per ESP) and nothing else. Treat them as two independent radios sharing a PCB.

5.1.2 Touchscreen UI navigation (screen-side ESP)

Marauder uses a three-zone touch scheme designed for resistive panels — no swipes, no multi-touch, no virtual keyboard:

  • Top third of screen — scroll up in a list / increase a numeric setting
  • Bottom third of screen — scroll down / decrease
  • Center — select / confirm / enter submenu
  • Tap anywhere on screen during an active scan or attack — stop (replaces the CLI’s stopscan command)

Resistive touch wants a stylus, fingernail, or pen-cap — a flat fingerpad won’t trigger reliably. The on-bench experience is roughly “thumbstick navigation on an old Game Boy”; functional, not slick.

Main-menu tree:

  • WiFi → Sniffers / Attacks / General
  • Bluetooth → Sniffers / Attacks
  • GPS → GPS Data / Wardrive / Bluetooth Wardrive
  • Settings → SavePCAP / SaveLog / TX power / Channel pin / Web Server / etc.
  • Device Info — firmware version, free heap, free flash, free SD
  • Update Firmware — OTA via Web Server (not the same as the Web-Serial-flash path used for first install)

5.1.3 Feature catalogue (relevant to AWOK V3, v1.12.1)

Wi-Fi Sniffers

  • AP Scan — list visible APs with channel, RSSI, encryption, bssid; tap to add to target list for later attacks
  • Station Scan — list clients per AP from probe/beacon traffic
  • Probe Request Sniff — passive, logs (client MAC, requested SSID) pairs to SD with timestamps
  • Beacon Sniff — log AP advertisements
  • Channel Analyzer — bar-graph of 2.4 GHz channel utilization; useful pre-attack
  • Deauth Sniff — passive deauth-frame detector (defensive: detects hostile deauth in your environment)
  • EAPOL / PMKID Scan — capture WPA2/3 handshake material to PCAP; combine with a Targeted Deauth in a second session to force a re-assoc
  • Pwnagotchi Detector — passive detection of Pwnagotchi devices in the area
  • Pineapple Detector — Wi-Fi Pineapple beacon-fingerprint check
  • Fox Hunt — RSSI tracker for a target MAC, channel-hopping (v1.12.0+); useful for direction-finding rogue APs
  • SAE Commit Monitor — WPA3-SAE handshake observer (research / attack-prep)
  • Flock Sniff — Flock LPR-camera detection (v1.12.1 added channel- hop + OUI filter)
  • Wardrive — combined Wi-Fi sniff + GPS log → WiGLE-format CSV on SD
  • Bluetooth Wardrive — same but for BLE devices

Wi-Fi Attacks (use only on owned networks or with written authorization — see § 11)

  • Deauth Flood — broadcast deauth against all APs on the current channel
  • Deauth Targeted — deauth a specific AP (and optionally a specific client) from the target list
  • Beacon Spam — broadcast SSID list (operator-supplied or random)
  • Probe Flood — generate probe-request floods
  • AP Clone (Karma) — Karma-style probe-response attack: respond to any probe for any SSID, attracting clients
  • Evil Portal — captive-portal phishing. The portal HTML is loaded from the SD card at runtime (Settings → Select EP HTML File). Captured credentials write to serial output, the on-screen log, and a log file on SD. Drop new portals onto the SD without reflashing.
  • Rick Roll Beacon — broadcast SSIDs that spell Rickroll lyrics
  • Sleep-Deprivation — variant designed to interrupt power-save mode client behavior
  • SAE Commit Flood — WPA3 SAE-commit flood

Bluetooth (BLE)

  • BT Sniff — passive BLE-advertisement logger
  • Flipper Detect — detect nearby Flipper Zeros from BLE advertising
  • AirTag Sniff — log AirTag advertising packets
  • AirTag Spoof — replay captured AirTag advertising bytes
  • Skimmer Detect — detect credit-card skimmer BLE signatures

BLE-spam variants (Bluetooth → Attacks): each targets a different device-side pairing dialog:

VariantTarget devicesEffect
Sour AppleiOS up through iOS 17Crash; iOS 18+ shows pair-prompt only, no crash
Swift PairWindows 10/11 with Swift Pair pairingPair-prompt spam
Samsung BLE SpamSamsung Galaxy / BudsPair-prompt spam (Galaxy ecosystem)
Google FastPairAndroid with FastPair enabledPair-prompt spam (Pixel / Pixel Buds / etc.)
Apple JuiceiOS misc. (v1.12.1 CLI command)Newer iOS pair-prompt variant
Flipper-Zero spamOther Flippers in BLE rangeBLE-pairing prompt spam targeting Flipper devices
BT Spam AllAggregateCycles through all the above variants in turn

These are denial-of-service-class attacks. Range is ~10–30 m. Don’t run in public.

GPS

  • GPS Data — live NMEA display (satellites, lat/lon, altitude, fix-quality). Cold-start indoors will linger on “No Fix” — this is normal for the internal patch antenna (§ 3.4).
  • Wardrive and Bluetooth Wardrive — see Wi-Fi Sniffers above. Wardrive will not write a row without a GPS fix. Verify lock before walking your route.

5.1.4 End-to-end command recipes

Deauth a specific AP (owned-network test):

  1. WiFi → Sniffers → AP Scan. Wait 10–30 s.
  2. Tap the target AP — it joins the target list.
  3. WiFi → Attacks → Deauth Targeted. Pick the entry from the list.
  4. Tap screen to stop.

Capture a WPA2 EAPOL handshake (owned-network test):

  1. Settings → SavePCAP = ON, verify SD card is present in Device Info.
  2. AP Scan → tap target → adds to target list.
  3. WiFi → Sniffers → EAPOL/PMKID Scan. Leave running.
  4. Open a second session in parallel: WiFi → Attacks → Deauth Targeted on the same target. This forces the client to re-associate, producing a 4-way handshake.
  5. After capture confirmation flashes on-screen, stop both sessions.
  6. PCAP is on SD as pcap_<timestamp>.pcap. Pull via Web Server or physical SD removal (power off first — V3 SD is not hot-swap).

Wardrive a route:

  1. Settings → SavePCAP and SaveLog as desired. Settings → confirm GPS is routed to the screen ESP (DIP switches, § 7.5).
  2. GPS → GPS Data. Wait for fix. Lat/lon must show real numbers, not “0.000”.
  3. GPS → Wardrive (or Bluetooth Wardrive for BLE-only).
  4. Walk / drive your route. Card writes wardrive_<timestamp>.csv continuously.
  5. Stop with screen tap. Card filename rotates per session.
  6. Upload at wigle.net/upload. Counts toward your wigle.net stats.

BLE-spam target selection:

  1. Bluetooth → Attacks. Pick a variant from the list (Sour Apple, Swift Pair, Samsung BLE Spam, Google FastPair, Apple Juice, Flipper Spam, or BT Spam All).
  2. Tap to start. Tap to stop.
  3. CLI equivalent (via Web Server CLI or Flipper FAP): blespam -t apple|samsung|swiftpair|all.

Evil Portal (red-team / training scenario only):

  1. Prepare your portal HTML on the SD card under /portals/. Use the examples in Marauder’s repo as a template.
  2. Settings → Select EP HTML File → pick your portal.
  3. WiFi → Attacks → Evil Portal. Configure the SSID the AP will broadcast.
  4. Tap to start. Client connections show on-screen and write to log.

5.1.5 WiGLE CSV format

Wardrive output is standard WiGLE format, suitable for direct upload at wigle.net:

MAC,SSID,AuthMode,FirstSeen,Channel,Frequency,RSSI,
CurrentLatitude,CurrentLongitude,AltitudeMeters,
AccuracyMeters,Type

Bluetooth Wardrive produces the same schema with Type = BLE and the MAC field holding the BLE advertising address. WiGLE accepts both in the same upload.

5.1.6 Companion FAP (orange-port ESP, Flipper-side)

The orange-port ESP, once running _marauder_dev_board_pro.bin, expects the Marauder companion FAP on the Flipper. Canonical source: 0xchocolate/flipperzero-wifi-marauder. The FAP is bundled with Momentum (mntm-012+), Unleashed, RogueMaster, and Xtreme — tjscientist’s AWOKflip unit gets it for free from its Momentum app set.

What it does:

  • Bridges the Flipper’s GPIO UART (pins 13/14) to the orange-port ESP’s CLI. The Flipper screen becomes a scrollable Marauder UI mirroring the ESP’s CLI: scanap, attack -t deauth, sniffraw, evilportal, wardrive, etc.
  • PCAPs from the orange-port ESP save to the Flipper’s SD card under apps_data/marauder/. This is the second storage path: the orange ESP can either go to its own (currently uninstrumented) flash, or hand data to the Flipper over UART for the Flipper to write to its much larger SD. The white-port screen ESP runs independently of the FAP — you can operate the touchscreen AND the FAP simultaneously, two parallel radios with two parallel log streams.

5.1.7 Settings and quirks

  • Settings → SavePCAP — must be ON for sniffers to write to SD on the screen ESP. OFF by default in some builds. If “SD initializing but nothing being saved” — this is the toggle.
  • Settings → Channel pin — lock a single channel instead of channel- hopping. Useful for EAPOL capture against a known target.
  • Settings → TX Power — calibrate against legal limits in your jurisdiction. Default is high.
  • Settings → Web Server — turn on the SoftAP for OTA firmware update and file browsing; default SSID is ESP32 Marauder with a published password.
  • Random list-scroll without touch input — bezel pressing the resistive screen edge. Trim the case bezel (§ 10.1).
  • Cross-flash bricks — V2 _flipper.bin on V3 orange port → ROM- recovery required.
  • No GPS fix indoors — internal patch antenna, no LNA. External active antenna mod (§ 10.2) for serious wardriving, or feed an external NMEA stream.

Strengths.

  • Most thoroughly tested on AWOK V3 of any firmware. AWOK’s own FAQ defaults to assuming Marauder.
  • Largest ecosystem — most YouTube tutorials, most forum threads, most community PRs are written against Marauder.
  • Touchscreen UI is purpose-built for resistive screens (three-zone scheme).
  • Best Flipper-side integration via the companion FAP — including SD storage via the Flipper.
  • Onboard SD support for PCAPs, wardrive CSV, Evil Portal HTML, and logs (Marauder ≥ v1.8.4).
  • Active feature development; release cadence ~6 weeks.

Weaknesses.

  • UI is functional but dated — green-on-black serial-terminal aesthetic. Newer firmwares (Ghost ESP, Bruce) feel more modern.
  • Some BLE-spam variants land in Ghost ESP first.
  • Evil Portal HTML is runtime-loadable from SD (good), but the bundled portal set is small; expect to write your own for serious use.
  • No native NRF24 / sub-GHz / 5 GHz — those are board limitations, not Marauder’s fault.

Recommended for: tjscientist. Almost everyone, as a starting point.

5.2 Ghost ESP (Spooks4576)

TL;DR. The “modern alternative.” More aggressive feature set, nicer UI, but no SD support on AWOK V3 as a firmware-side gap — Ghost ESP simply hasn’t ported its SD layer to AWOK / Marauder-V6 boards. The hardware slot is there (§ 3.8); other firmwares (Marauder ≥ v1.8.4) write to it; Ghost ESP doesn’t yet.

Repo: github.com/Spooks4576/Ghost_ESP Site: ghostesp.net Tagline: “ESP32 Wireless Security Testing Platform”

Project shape. Newer than Marauder, more active commit pace, larger maintainer team. Releases on GitHub plus a Web Flasher hosted on the project site. Has a Flipper Zero companion FAP (Ghost ESP FAP) that gives parity-ish UI between phone-controlled and Flipper-controlled modes.

Feature surface (relevant to AWOK V3):

  • Wi-Fi: Beacon / deauth / Evil Portal (with runtime-loadable HTML), DNS spoof, packet flooding
  • BLE: scan, spam (Sour Apple, Samsung, Microsoft), Skimmer detection
  • IR: receive/replay (only on boards with IR — AWOK V3 has none)
  • NFC: only on boards with NFC silicon — not AWOK
  • GPS wardriving with WiGLE export — but no SD writes on AWOK class yet (firmware-side gap, see TL;DR; logs land in internal flash only, exfil via Web UI)
  • Web UI for browser-based control over Wi-Fi
  • “Cast Random Video” / Chromecast disruption / Printer Power FAP novelty features

AWOK V3 specific status. From the project’s own Board-Specific Guide wiki page: “Marauder V6 and AWOK variants: No SD card support.” This is a firmware-side limitation, not the hardware constraint earlier documentation implied — the SD slot is physically present and Marauder v1.8.4+ writes to it without trouble. Ghost ESP just hasn’t ported its SD I/O layer to the AWOK / Marauder-V6 board family. Logs on Ghost ESP + AWOK go to internal flash partition (small) and exfil over the Web UI. If you need persistent on-board capture storage, run Marauder on the screen ESP and reserve Ghost ESP for live-attack work where exfil-by-Wi-Fi is acceptable.

The screen-ESP UI on AWOK is functional but designed for capacitive touchscreens like the M5Stack Cardputer — on AWOK’s resistive panel some buttons are awkward to hit reliably.

Strengths.

  • Best-in-class BLE-spam variants (more device targets than Marauder).
  • Captive-portal HTML is runtime-loadable — you can swap portals from USB without reflashing.
  • Active feature development; major releases every few months.
  • Better Flipper-side companion FAP UI than Marauder’s.

Weaknesses.

  • No SD writes on AWOK V3 — firmware-side gap; Ghost ESP wiki documents the limitation as “no plans” for AWOK / Marauder-V6 boards. Card is physically present and works under other firmwares, but Ghost ESP can’t use it. Logs are flash-only, exfil via Web UI.
  • Touchscreen UI ergonomics worse than Marauder on resistive screens.
  • “Move-fast-and-break-things” pace: occasional regressions, releases sometimes need a follow-up patch.
  • Some features (Cast Random Video, Printer Power) are gimmicky and add UI surface area without genuine red-team value.

Recommended for: users who want runtime-loadable Evil Portal HTML, modern BLE spam, or who already use Ghost ESP elsewhere. Realistic to dual-flash — Marauder on one ESP, Ghost ESP on the other — to get parallel access to both feature sets.

5.3 Bruce (BruceDevices / pr3y)

TL;DR. ESP32 multi-tool firmware originally for the M5Stack Cardputer and CYD (“Cheap Yellow Display”) class. Officially-supported-device list does not currently include AWOK V3. Community ports exist but are unofficial.

Repo: github.com/BruceDevices/firmware Site: bruce.computer

Project shape. Heavy active development. Architectured as a multi-board firmware with configuration flags per board. Excellent UX on the boards it officially supports.

Feature surface (full Bruce — varies by board):

  • Wi-Fi attacks (subset of Marauder’s, plus Beacon Spam variants)
  • BLE attacks (similar surface to Ghost ESP)
  • IR / NFC / Sub-GHz on boards with the silicon (Cardputer, T-Embed CC1101)
  • File-manager UI, SD-card-aware
  • USB HID injection on USB-OTG-capable boards
  • GPS wardriving where hardware supports

AWOK V3 specific status. Bruce’s official Supported Devices list covers M5Stack family (Cardputer, StickC, etc.), LilyGo T-Watch / T-Deck / T-Embed, the CYD (“Cheap Yellow Display”) and the Marauder Mini. AWOK Dual Touch V3 is not in the supported-devices matrix as of this writing. Community ports may exist (search “bruce awok” on GitHub forks) but should be treated as experimental: pin maps and bootstrap config must be matched manually against AWOK’s two-ESP architecture, and there’s no official build for the Flipper-side ESP.

Strengths.

  • Cleanest UI in the ESP32-multi-tool space.
  • Excellent on capacitive-touch boards.
  • Single binary covers all features (no Marauder-style “do I want the v6_1 binary or the dev_board_pro binary?” dance).

Weaknesses for AWOK V3 specifically.

  • Officially unsupported on AWOK V3 — installation requires either a community fork or a custom build with hand-edited pin configs.
  • Resistive-touch ergonomics not great.
  • No Flipper-side companion FAP; the Flipper-side ESP would be left running Marauder or Ghost ESP regardless.

Recommended for: Skip on AWOK V3 unless you have a specific reason. If you love Bruce’s UI, the Cardputer is a much better host platform — that device is in your Hack Tools roadmap anyway.

5.4 Less-relevant alternatives (mentioned for completeness)

FirmwareAWOK V3 statusNotes
Marauder (kashmir54 / VoyagerRF)Compatible — fork of Marauder with extra Flipper integrationsWeb flasher at kashmir54.github.io/voyagerrf/
FlipperHTTP (jblanked)Compatible on Flipper-side ESP onlyReplaces Marauder companion entirely; turns the ESP into an HTTP/JSON bridge for FAPs that need internet. Not what you want for wardriving — they’re alternative roles.
Black Magic Probe (flipperdevices/blackmagic-esp32-s2)Officially S2-onlyWon’t run on V3’s WROOM-32 Flipper-side ESP.
Custom IDF buildsPossiblePin map and partition table must be hand-authored. Useful only if you have a specific feature gap and time to build. § 5.5.

5.5 Custom builds (DIY route)

Both ESPs run plain ESP-IDF underneath. You can clone the ESP32 Arduino core, point your platformio.ini at the AWOK pin map, and build any ESP-Arduino sketch you want. The reference pin maps live in:

  • justcallmekoko/ESP32Marauder/configs/marauder_dev_board_pro.h (orange)
  • justcallmekoko/ESP32Marauder/configs/marauder_v6_1.h (white)

Realistic custom-build projects:

  1. Bare-bones probe-request logger with 16 MB external flash module wired to the screen ESP’s free SPI (a true storage upgrade, but a hardware mod — not for V3 stock).
  2. NMEA-only GPS-passthrough firmware on the screen ESP that turns the AWOK into a USB-C GPS dongle for a laptop. Niche.
  3. Wi-Fi-tagged BLE beacons using ESP-NOW for cross-device coordination between the two ESPs (would require routing a hardware UART between them, currently absent).

For tjscientist’s first install, don’t go custom — start with Marauder and get fluent.

5.6 Decision matrix

You wantPick
The default, just works, biggest ecosystemMarauder on both ESPs
Runtime-loadable Evil Portal HTMLGhost ESP on the screen ESP
Best of bothMarauder on the Flipper-side ESP + Ghost ESP on the screen ESP
To use Bruce’s UISkip — wrong board for Bruce; use a Cardputer
Flipper-side HTTP/JSON bridge for custom FAPsFlipperHTTP on Flipper-side ESP, Marauder on screen
Wardriving with WiGLE exportMarauder + GPS routed to whichever ESP captures
To break things on purposeBuild IDF from source — § 5.5

Recommended starting config for tjscientist. Flash Marauder on both ESPs. Run for a week. Decide if you want to swap the screen ESP to Ghost ESP for the runtime-loadable portal feature.


6. Install procedures

This section is the operational sequence for each firmware option, in the order you’d actually do it.

6.1 What you need before you start

  • A laptop with a real USB-C port (or USB-A + dongle).
  • Chrome or Edge (for Web Serial flashing — Firefox does not support Web Serial).
  • A USB-C data cable that’s not power-only. Test cables vary; power-only USB-C cables are sadly common and present as “device not enumerating” symptoms.
  • The Silicon Labs CP210x driver if Windows doesn’t auto-install it. macOS and modern Linux work out of the box. Some AWOK batches ship with CH340C bridges instead — drivers from wch.cn then.
  • The AWOK powered only via the port you intend to flash. Some users report that having both USB-Cs plugged into different host machines simultaneously confuses the bus enumeration.
  • A stylus or pen tip for the touchscreen post-flash sanity check.

FZEE Flasher (fzeeflasher.com) is a browser-based Web Serial flasher that handles board selection, binary download, and flashing in one flow. It’s the simplest path and what AWOK Dynamics’ own FAQ now points users at.

Flash the screen ESP (white USB):

  1. Plug the AWOK into your laptop via the white USB-C port only.
  2. Open Chrome → https://fzeeflasher.com/.
  3. Click Connect. In the Web Serial dialog, pick the new COM/tty port that just appeared (e.g. COM7 on Windows, /dev/cu.SLAB_USBtoUART on macOS). If multiple ports appear, you can wiggle the cable to identify which one disappears/reappears.
  4. Under Select Board, choose AWOK Dual Touch V3 — Screen (white port). (Wording varies by FZEE update; the key is “Screen / V6_1”.)
  5. Under Firmware, choose Marauder, latest version.
  6. Click PROGRAM. Wait. The flash takes 60–120 s.
  7. When you see “FLASHING PROCESS COMPLETED!”, press the RESET button on the AWOK (or unplug-replug). The touchscreen should boot into the green-on-black Marauder home screen.

Flash the Flipper-side ESP (orange USB):

  1. Unplug the white cable. Plug into the orange USB-C port instead.
  2. Repeat steps 2–4, but pick AWOK Dual Touch V3 — Flipper (orange port) for the board (the suffix is _marauder_dev_board_pro).
  3. Pick Marauder, latest version, PROGRAM, wait, RESET.
  4. Mount the AWOK on a Flipper Zero. On the Flipper, run the WiFi Marauder companion FAP. The FAP should display the Marauder version banner from the orange-side ESP within a few seconds. If it shows “No response from ESP”, check cable orientation, that the ESP is powered (LED behavior on the orange side), and that the FAP is a recent build (Momentum mntm-012 ships a fine one).

6.3 Flash via Marauder’s own web flasher (alternative)

justcallmekoko.github.io/ESP32Marauder/flasher.html (search the wiki for the current URL) is the upstream-blessed equivalent of FZEE Flasher. Same steps, slightly less polished UI. Use this if FZEE is down or if you need a Marauder-specific build that FZEE hasn’t picked up yet.

6.4 Flash via FZEasyMarauderFlash (Python CLI)

github.com/SkeletonMan03/FZEasyMarauderFlash — a Python script wrapping esptool.py. Useful if you’re on Linux without a Web-Serial-capable browser, or if you want to script repeated flashes for fleet work.

git clone https://github.com/SkeletonMan03/FZEasyMarauderFlash
cd FZEasyMarauderFlash
python3 -m pip install --user esptool
python3 EasyInstall.py

The script is interactive: it prompts for board, port, and firmware. Pick the V3-screen or V3-flipper option in the menu.

6.5 Flash Ghost ESP via the Ghost ESP Web Flasher

The Ghost ESP project hosts a Web Flasher on ghostesp.net. Procedure mirrors § 6.2 — the AWOK V3 screen is recognized as a target; the Flipper-side AWOK is handled via the project’s “Marauder Devboard Pro” preset (since the boot/UART routing matches). Do this in addition to, not instead of, having a Marauder build at hand — it’s easier to revert to Marauder if Ghost ESP misbehaves than the other way around.

6.6 Flash via raw esptool.py (the always-works fallback)

When everything else fails:

# Find the right binary on github.com/justcallmekoko/ESP32Marauder/releases
# Screen ESP (white):
esptool.py --chip esp32 --port /dev/ttyUSB0 --baud 921600 \
    write_flash 0x1000 esp32_marauder_v0.13.0_v6_1.bin

# Flipper-side ESP (orange):
esptool.py --chip esp32 --port /dev/ttyUSB0 --baud 921600 \
    write_flash 0x1000 esp32_marauder_v0.13.0_marauder_dev_board_pro.bin

Adjust the version string and the offset for your binary’s release notes (some Marauder releases include a separate bootloader + partition image and require multi-offset flashing — read the release notes in those cases). The 0x1000 offset works for most monolithic releases. Use this path if you’re already comfortable with esptool.py from prior ESP work (tjscientist is — this is the path with the smallest amount of “magic”).

6.7 Recovery if you brick

The ESP32 ROM bootloader is un-brickable from software alone — the mask-ROM bootloader is in silicon. To recover from a bad flash:

  1. Hold BOOT on the affected ESP’s button block.
  2. While holding BOOT, press RESET briefly and release.
  3. Release BOOT.
  4. The ESP is now in ROM bootloader mode. Re-run the flasher.

If the buttons themselves are flaky (a known V3 quirk on some batches), you can short the BOOT pin to GND with a tweezer tip while pressing RESET — same effect. Read the silk on the back of the PCB to find the pad.

If esptool.py reports “Failed to connect to ESP32: Timed out waiting for packet header”, the chip is not in bootloader mode — repeat the sequence above, slowly. ESP32 is forgiving; you cannot brick the bootloader itself.

6.8 Verifying a successful install

Screen ESP, post-flash:

  • Touchscreen lights up within ~2 s of power-on.
  • Marauder logo or main menu appears.
  • Tapping any menu item produces a response (resistive touch — press firmly).
  • Going to GPS Data menu shows NMEA arriving when DIP switches route GPS to this ESP.

Flipper-side ESP, post-flash:

  • LEDs on the orange-side block blink at boot.
  • Mounting on the Flipper and opening the Marauder companion FAP shows the Marauder version banner.
  • A scan command from the FAP returns Wi-Fi networks.

Both together:

  • Both ESPs scanning at the same time will produce two parallel result lists. There is no inter-ESP coordination — each is its own scanner.

7. Operating the firmware (day-to-day workflows)

This section assumes Marauder on both ESPs (the recommended starting config from § 5.6). Workflows for Ghost ESP are similar in shape.

7.1 Screen-side workflow (standalone, from the touchscreen)

Boot. Main menu.

  • Wi-Fi → Sniffers → Probe Request Sniff — passive scan; logs probe requests with associated MAC addresses to internal flash. Run in a coffee shop for a few minutes; the device map you build is a good first reality-check that the board works.
  • Wi-Fi → Sniffers → AP Scan — list all visible APs with RSSI and channel. Select an AP to deep-dive (clients, encryption, etc.).
  • Wi-Fi → Attacks → Beacon Spam — broadcast a list of fake APs. Useful for SSID-disclosure tests. Legal: see § 11.
  • Wi-Fi → Attacks → Deauth — deauth flood against a selected AP and client. Illegal in many jurisdictions; only on owned networks.
  • Wi-Fi → Evil Portal — captive-portal phishing. Edit captured creds via the Web Server menu.
  • BLE → BLE Scan — list BLE advertisements.
  • BLE → Sour Apple — Apple-only AirDrop / proximity-pairing spam.
  • GPS → GPS Data — verify NMEA fix. Cold-start indoors will linger on “no fix” — this is normal (§ 3.4).
  • GPS → Wardrive — combined Wi-Fi scan + GPS log. WiGLE-compatible output. Walk a route with the AWOK powered via USB-C power bank, then pull the log over USB serial.

7.2 Flipper-bridged workflow (from the Flipper UI)

Boot the Flipper, mount the AWOK, open WiFi Marauder FAP.

  • Settings → Send via UART → “scanap” — initiates an AP scan on the Flipper-side ESP, results stream back to the Flipper screen.
  • The FAP exposes most Marauder commands as menu items; for unusual commands, you can drop into a CLI mode and type Marauder commands directly.
  • Save log to SD writes the Flipper’s UART buffer to the Flipper’s microSD (not the AWOK’s flash) — if your Flipper has a sane SD card, this is your best long-session storage option.

7.3 Both at once

Useful pattern: leave the screen ESP passively wardriving (writing to its small internal flash) while you actively run targeted attacks from the Flipper-side ESP via the Marauder FAP. Two separate radios, two separate log streams — they don’t collide.

7.4 Pulling logs off

Three paths, in order of convenience:

  1. Power off the AWOK, remove the microSD card, mount on a laptop. This is the canonical exfil path on Marauder ≥ v1.8.4. PCAPs land at the SD root with pcap_<timestamp>.pcap; wardrives at wardrive_<timestamp>.csv; Evil Portal credentials in the log files. Card is not hot-swap per AWOK FAQ — power-cycle before inserting/removing or you risk filesystem corruption. Open PCAPs in Wireshark, upload CSVs directly at wigle.net/upload.
  2. In-place over the Web Server (Marauder screen ESP) — Settings → Web Server. The ESP becomes a SoftAP (ESP32 Marauder SSID, default password in the Marauder wiki). Connect from phone/laptop, browse to its IP, download files. Works for both SD contents and internal- flash logs. Slower than physical card removal but doesn’t require power-cycling.
  3. From the Flipper’s SD via the companion FAP — orange-port ESP captures (those that flow over UART rather than going to the AWOK’s own SD) land in apps_data/marauder/ on the Flipper’s microSD. Pull via qFlipper or by removing the Flipper’s card.

Ghost ESP has no SD-write path on AWOK V3 (§ 5.2). Its captures write to internal flash; exfil is the Web UI only.

The screen ESP’s SD is the canonical capture target on V3 — bigger than internal flash by orders of magnitude (up to 32 GB FAT32 vs. hundreds of KB), survives device reboot, and is mountable on any laptop. The Flipper’s SD via the FAP is the right answer when running a Flipper-bridged session and you want the captures in the Flipper’s apps_data/marauder/ tree anyway.

7.5 GPS DIP switch routing in practice

Use caseDIP routing
Pure standalone wardriving with screen UIGPS → Screen ESP only
Flipper-driven wardriving (Marauder FAP shows GPS coords)GPS → Flipper-side ESP only
Both ESPs logging WiGLE in parallelGPS → both (UART tee)

Flip the DIPs with the board powered off — hot-flipping can confuse the UART line state.


8. Standalone operation and the Dual Board Battery Backpack

The V3’s defining trait is its dual-mode operation: it can run mounted on a Flipper Zero, where the Flipper provides UI + (via the FAP) SD storage and forms the chassis, OR it can run fully standalone — touchscreen UI, onboard GPS, onboard SD, all driven from its own power source. This section covers the standalone path: the official battery accessory, how to operate the device without a Flipper attached, and the unresolved electrical-safety question around mixing power sources.

8.1 Why standalone matters

Three concrete scenarios where standalone is the right answer:

  1. Pocket wardriving — AWOK on the battery backpack, in a jacket pocket, walking a city block. The Flipper stays home. Wardrive runs on the screen ESP, writes WiGLE CSV to the onboard SD, GPS pulls from the internal patch (or external if modded).
  2. Stationary Wi-Fi survey — AWOK on a power bank, on a desk, in another room. Sniffs probe traffic for hours. No Flipper needed.
  3. Field demo — show someone “what an ESP32 wardriving handheld looks like” without a Flipper. The touchscreen and dual-radio visual are the demo.

The screen ESP’s Marauder UI is feature-complete for these scenarios — the only thing standalone-mode loses is the Flipper-side ESP’s UART bridge to the Flipper’s UI, which has no consumer in standalone mode anyway.

8.2 The “Dual Board Battery Backpack” accessory

AWOK Dynamics sells a dedicated backpack at awokdynamics.com/products/dual-board-battery-backpack.

SpecValue
Price$37 USD
What’s in the boxPCB + 3D-printed case + JST-PH2.0 adapter wire (with PH2.0-to-PH1.25 included) + 2× M3×5 mm screws
BatteryBYO — single 3.7 V 1S LiPo, user-supplied
Case envelope (Touch variant)75 × 45 × 10 mm internal LiPo pouch
Case envelope (Mini variant)65 × 35 × 10 mm
ProtectionIntegrated over-charge / over-discharge per vendor listing
Compatible modelsDual Mini, Dual Touch V2 / V3 / C5 — same backpack covers the family
Charging interfaceImplicit via the AWOK’s own USB-C inputs feeding the JST-PH2.0; no dedicated USB-C charging port on the backpack itself
Runtime estimateVendor publishes none. Practical: a 2000–2500 mAh / ~7.4–9.3 Wh cell in the case envelope at ~250 mA average draw → ~30–37 Wh-divided runtime, conservatively 4–8 hours depending on scan/attack activity

Mechanical integration. The backpack screws into the Flipper-mount slot on the back of the AWOK PCB — i.e., it physically takes the role the Flipper would otherwise occupy. The 3D-printed case forms a “wide base” so the unit can stand upright on a desk. With the backpack attached, the AWOK is no longer mountable on a Flipper without unscrewing the backpack first.

Choosing a cell. Common 3.7 V 1S LiPo cells in the 75 × 45 × 10 mm envelope:

CapacityWhSourceNotes
1500 mAh (40 × 70 × 6 mm typical)5.5 WhAdafruit #1781, Sparkfun PRT-13854, AliExpressFits with room to spare; conservative pick
2000 mAh (40 × 50 × 7 mm)7.4 WhAdafruit #2011 (“rectangular 2000 mAh”), generic AliExpressCommon sweet spot
2500 mAh (45 × 60 × 8 mm)9.25 WhGeneric AliExpress, hobby drone packsMaximum capacity in the case envelope
18650 cell + carrier9–12 WhCylindrical, won’t fit the AWOK backpackUse a USB-C power bank instead if you want 18650

Confirm the JST-PH2.0 connector polarity on the cell before connecting — many AliExpress LiPos ship with arbitrary polarity. Wrong polarity is the #1 way to instantly kill an integrated protection circuit. Use a multimeter; AWOK’s backpack expects standard (JST-PH-2.0 red = +, black = −).

8.3 Standalone operating procedure

With the backpack screwed on and a charged LiPo plugged in:

  1. Power on — press/hold the power switch on the backpack PCB (AWOK may also auto-power-on when the cell connects; check the listing for the specific backpack rev).
  2. Screen ESP boots into whatever firmware you flashed (Marauder most likely). Touchscreen lights up within ~2 s. GPS starts cold- acquiring (move outdoors for first fix).
  3. Operate from the touchscreen — three-zone navigation per § 5.1.2. All Marauder features work without the Flipper present.
  4. Captures write to the onboard microSD card (§ 3.8). Power-cycle to insert / remove the card.
  5. Charge — plug a USB-C cable into the screen-side (white) USB-C port. One source at a time. See § 8.4.

Note: the Flipper-side (orange) ESP is still powered when running on the backpack, but it has no consumer for its UART traffic without a Flipper attached. It will sit idle running whatever firmware it has (typically _marauder_dev_board_pro.bin) and consume ~30–50 mA. If you want to save those mA over a long session, flash the orange ESP with a low-power sketch or accept the modest drain.

8.4 ⚠ Power-input safety — the unresolved question

The AWOK V3 has four distinct power-input paths:

  • USB-C #1 (white port, screen ESP side)
  • USB-C #2 (orange port, Flipper-side ESP)
  • Flipper GPIO header — 3V3 in/out when the AWOK is mounted on a Flipper
  • Battery backpack JST-PH2.0 — 3.7 V LiPo direct

AWOK Dynamics publishes no schematic for the V3. The community has no documented teardown of the V3 power-input topology. Specifically unanswered as of this writing:

  • Is the 3V3 rail diode-OR’d between the four inputs, or are they hard-tied?
  • Is there a power-input selector switch?
  • Does plugging USB-C into one or both ports back-feed onto the Flipper’s 3V3 rail through the GPIO header (which would push current the wrong way through the Flipper’s regulator and could damage it)?
  • Does the battery backpack include input-OR’ing or does it just parallel-connect to the same rail?

Until the topology is verified, follow this rule: one power source at a time.

Practical guidance:

ModePlugDon’t plug
Standalone on battery backpackLiPo into backpack JSTUSB-C, Flipper
Standalone on USB-CEither USB-C (your pick)The other USB-C, Flipper, backpack
Flipper-mounted operationFlipper provides 3V3 via GPIOUSB-C ports, backpack
Charge the backpack LiPoUSB-C into the white port onlyThe other USB-C, Flipper

Verification procedure (do this before mixing sources):

  1. Power off everything. Disconnect the AWOK from the Flipper.
  2. Plug only USB-C #1 (white) into a benchtop supply with current limit at 1.5 A. Power on. Scope the 3V3 rail at the GPIO header (or measure with a DMM). Record voltage and idle current.
  3. Repeat with USB-C #2 (orange) only.
  4. Repeat with the battery backpack only (LiPo connected, USB-Cs disconnected).
  5. Carefully — with the Flipper disconnected — apply two sources at once (e.g. both USB-Cs) and watch for: (a) higher than expected 3V3 rail voltage, (b) unexpected current flow when one source is raised slightly above the other (indicating no isolation diode), (c) any thermal anomaly on the AWOK’s voltage regulator IC.
  6. If steps 1–4 show clean isolation, you can then try Flipper-attached
    • single-USB-C with a current meter in series with the Flipper’s USB.
  7. Only after the above does NOT show back-feed, mix sources in normal use.

Draft question to send AWOK Discord support before the above (worth asking first; vendor may have an authoritative answer that saves you the bench work):

Question about Dual Touch V3 power-input topology: the board has four possible power inputs (USB-C ×2, Flipper 3V3 via GPIO header, battery backpack JST-PH2.0). Could you describe the power-merge circuitry? Specifically:

1. Are the four inputs diode-OR’d, or does the board rely on a selector or external isolation? 2. With the module on a Flipper AND USB-C plugged in to one or both AWOK ports — does the AWOK back-feed the Flipper’s 3V3 rail through the GPIO header? 3. Is plugging the battery backpack while USB-C is also connected a supported configuration (for charging the LiPo from USB-C), or do you recommend strictly one source at a time? 4. Is there a schematic available for the V3?

Thanks — trying to write up safe-operation guidance for our lab.

The answer set will tell you which of the configurations in the table above are vendor-blessed vs. user-beware. Update this section when AWOK responds.

8.5 Community alternatives to the official backpack

For completeness:

  • USB-C power bank — any sane 5 V power bank (Anker, INIU, etc.) with a USB-C output works. Plug into one of the AWOK’s USB-C ports. This is the simplest standalone-power answer if you don’t want the $37 backpack and don’t mind dangling a cable.
  • 3D-printed battery sandwich shell — predates the official backpack on Printables / Thingiverse. Same idea (LiPo + boost converter) in a community-designed shell. Search “AWOK Dual Touch V3 battery” on Printables.
  • External 18650 holder + USB-C output — common power-bank pattern. More capacity (typically 3000–3500 mAh / 11–13 Wh) than the LiPo cells that fit the backpack envelope, at the cost of bulk.

8.6 Wireless control of a standalone AWOK — Marauder’s Web UI

When the AWOK is operating standalone on the battery backpack (or a USB-C power bank) and you want a remote control surface — a larger screen, a real keyboard, or just keeping the AWOK in your pocket / bag — the zero-code answer is Marauder’s built-in Web UI.

Procedure:

  1. On the AWOK (screen-side ESP, Marauder running): Settings → Web Server. The ESP brings up a SoftAP (default SSID ESP32 Marauder; default password documented in the Marauder wiki).
  2. On the client device: connect to that SoftAP. Browse to the AP’s IP (typically 192.168.4.1). The page exposes:
    • Live status (free heap, free SD, scan state)
    • Command CLI matching the touchscreen feature surface
    • File browser for the onboard microSD (download PCAPs, CSV, logs; upload Evil Portal HTML)
    • OTA firmware updater
  3. Run scans/attacks from the browser. Results stream back over the SoftAP link. Captures land on the AWOK’s SD as usual.
  4. When done, Settings → turn the Web Server off (it consumes ~30 mA extra and weakens BLE range slightly when active).

Why this beats a Flipper-controlled-over-BLE workflow:

  • Works today, zero code to write.
  • Larger UI surface than the Flipper’s 128×64 OLED.
  • File browser + downloads built in — no Flipper-side FAP shuffle.
  • Any Wi-Fi-capable device with a browser is a candidate controller: phone, laptop, tablet, uConsole (the obvious pick once tjscientist stands up the uConsole — its 5″ 720p screen plus real Linux Chromium is ideal for this; until then, an Android phone is the fallback). A Flipper- with-BLE-central-firmware-fork was the alternative that lost (see feasibility analysis in the project Progress Log).

Limitations:

  • The Marauder SoftAP is a single-purpose AP — while the Web Server is on, the screen ESP can’t also be scanning hostile APs on the same radio (they share the chip). For “Web UI + scanning” you operate the Flipper-side (orange) ESP as the scan/attack radio while the screen ESP runs the SoftAP — the V3’s dual-ESP architecture is exactly built for this split.
  • The SoftAP password is published — anyone in range can connect. For sensitive work change the password in Settings before bringing it up, or run only in environments where that doesn’t matter.
  • Range is short (10–20 m typical) and clear-line-of-sight preferred. This is BLE-class range, just over Wi-Fi.

Recommended workflow when uConsole comes online: AWOK on the battery backpack in pocket → AWOK’s screen ESP runs SoftAP + Web UI → uConsole (also pocket) joins the SoftAP → uConsole’s browser is the control surface. Scans/attacks run on the AWOK’s Flipper-side ESP; captures land on the AWOK’s SD; uConsole pulls them over the Web UI when convenient. Closest thing to “AWOK as a wireless-controlled standalone hacking puck” that doesn’t require writing a single line of code.


9. Known issues and mitigations

Consolidated from the AWOK FAQ, community forums, Marauder release notes, and Ghost ESP docs.

IssueWhyMitigation
Lists auto-scroll without inputBezel pressing the resistive touch edge§ 10.1 — bezel-trim mod
GPS never gets a cold fix indoorsInternal ceramic patch + no LNA§ 10.2 — external active GPS antenna mod
”No response” from Flipper-side ESP in the FAPWrong binary flashed (V2 binary on V3 hardware)Reflash with _marauder_dev_board_pro.bin
One ESP works, the other refuses to bootUSB-C cable may be data-only on one portSwap cable, retry; some USB-C cables are weird
Touchscreen unresponsive after flashMarauder build mismatched the screen ICEnsure binary suffix is _v6_1
Bootloops on Wi-Fi attack burstPower brownout (Flipper rail used)Power via USB-C, not the Flipper
Boot LED doesn’t lightBoot button pressed during resetRelease BOOT, hit RESET briefly, retry
Companion FAP can’t connectFlipper UART speed mismatchMarauder FAP defaults to 115200; recent builds support higher — match in FAP settings
Web Server SSID never appearsNon-screen-ESP firmware runningVerify you flashed _v6_1.bin to the screen ESP
FZEE Flasher fails to connectDriver missing on WindowsInstall Silicon Labs CP210x driver from silabs.com
Two-laptop mode confuses portsKernel enumerator choosing different /dev nodesFlash from one machine, both ports sequentially

10. Modding the AWOK V3

10.1 Bezel-trim (essential if you see auto-scroll)

Why: the inside lip of the clear ABS case presses the resistive touchscreen edge against its frame, registering a constant near-corner “down” event. UI lists then scroll without input.

Tools: X-Acto knife, fine sandpaper (400 grit), or a Dremel with a sanding drum.

Steps:

  1. Pop the case open (slides apart from the bottom).
  2. Identify the corner where the auto-scroll is centered (you’ll feel a slight bezel-screen contact when assembled).
  3. Shave 0.3–0.5 mm off the inside of the bezel along that corner.
  4. Reassemble. Verify: no input, list does not scroll.

This is a 5-minute fix and is documented in AWOK’s FAQ.

10.2 External active GPS antenna

Why: the internal ceramic patch + no LNA combination is unreliable for cold fix anywhere except clear sky. For genuine wardriving you want a real antenna.

Approach: the GPS module on the AWOK is a u-blox-class module with a u.FL connector pad on the PCB next to the patch antenna. Remove (or just disconnect) the patch and solder a u.FL pigtail to the pad, then route to an SMA bulkhead on a 3D-printed back shell. Use any active GPS antenna (3.3 V LNA at the antenna head — common cheap automotive ones do the job).

This is a delicate mod on a multilayer PCB. Practice on a junk u-blox module first if you haven’t done one.

Alternative: clip a TTL-level NMEA stream from an external GPS (an M5Stack GPS Hat or even a Cardputer running a GPS sketch) into the AWOK’s GPS UART pin via the DIP-switch header. This is faster, less risky, and equivalent in function — it just bulks up the kit.

10.3 Aftermarket case / 3D-printed shell

The community has at least three 3D-printed back-shells published on Printables and Thingiverse:

  • Battery sandwich shell — adds a 1S Li-Po + boost converter to the back, turning the AWOK into a true handheld.
  • Antenna pigtail bulkhead shell — relocates the SMA jacks for a more ergonomic antenna angle.
  • Shoulder-rig shell — for body-mounted long-duration logging.

None of these are “official” mods but all are reproducible from open STL files. Search Printables for “AWOK Dual Touch V3” — typical state for this kind of niche hardware.

10.4 Soldering a 16-MB external flash to the screen ESP (largely obsolete)

The screen ESP exposes a free SPI bus on a few unused pads, and pre-v1.8.4 this was the recommended path for getting real capture storage onto a V3. With Marauder v1.8.4+ writing to the onboard SD slot (§ 3.8), the mod is no longer load-bearing — the SD slot does what this mod was for, but larger and without rework. Keep this as a reference for anyone wanting to add a third storage path or build custom firmware that wants flash plus SD. Not a beginner mod. Pinout reference: marauder_v6_1.h.

10.5 Section update (2026-05)

The bezel-trim, external GPS antenna, and case mods remain the practical ones. The flash-mod (§ 10.4) and the community LiPo-sandwich (§ 10.3) have both been largely superseded — by Marauder SD support and by the official Battery Backpack (§ 8.2) respectively.


The AWOK V3 is a monitoring board by AWOK’s marketing claim — but the hardware is fully capable of active Wi-Fi attacks, and the firmware options described above expose them. The “monitor only” disclaimer on the AWOK product page is legal cover, not a hardware constraint. The chip will transmit deauth frames if you flash deauth-capable firmware and tell it to.

Concrete rules of engagement. Apply these on every use:

  1. Own the network or have written authorization. Wi-Fi deauth is an FCC Part 15 violation in the United States and the equivalent in EU (RTTE / RED) and most other jurisdictions. Penalties are real (fines, not warnings).
  2. Captive portals (Evil Portal) are computer-fraud territory in every developed jurisdiction the moment they capture credentials from a non-consenting user. Legitimate uses: red-team engagements with written scope, training environments with informed participants, your own home network for security awareness.
  3. BLE spam (Sour Apple, Samsung, Microsoft variants) is a denial-of- service against nearby devices. Range is ~10–30 m. Don’t use it in public.
  4. Wardriving (passive Wi-Fi + GPS scan) is generally legal in the US and most of the EU — it logs publicly-broadcast information. Posting wardrive logs that include credentials or detailed AP locations is another matter.
  5. PCAP capture of your own traffic is fine. PCAP capture of third-party traffic on a network you don’t own is wiretapping in many jurisdictions.
  6. The Flipper Zero context. When mounted on a Flipper, the same rules apply. The Flipper does not magically grant authorization.

This list is not legal advice; it is an operating discipline for the Hack Tools lab. The cross-tool legal/ethics notes in Hack Tools/_shared/legal_ethics.md apply.


12. AWOK Dual Touch V3 in tjscientist’s Hack Tools lab

Where AWOK fits relative to the other tools on the bench:

JobAWOK V3Alternative on the bench
2.4 GHz Wi-Fi probe / deauth / Evil PortalBest handheld option tjscientist ownsWiFi Devboard (ESP32-S2) on the Flipper — no screen, lower polish
BLE scanning / spamYesFlipper Zero stock BLE — no spam, scan only
Sub-GHzNoFlipper Zero (CC1101); HackRF One (full SDR)
Wideband signal captureNoHackRF One (full SDR)
5 GHz Wi-FiNoNone on the bench yet — Apex 5 would fill this gap
GPS NMEA logging onlyPossible (use as USB-GPS dongle)Standalone u-blox module
Wardriving (Wi-Fi + GPS combined)Best on the benchNone of the others combine both natively

Pairing recommendations:

  • AWOK V3 + Flipper Zero (mounted): full coverage of 2.4 GHz Wi-Fi, BLE, plus the Flipper’s sub-GHz / NFC / IR / iButton subsystems. The natural “everything below 6 GHz that isn’t a real SDR” handheld.
  • AWOK V3 + HackRF One PortaPack: AWOK does the protocol work (Wi-Fi audit, captive-portal); HackRF does signal capture and analysis. Two complementary handhelds in the same kit.
  • AWOK V3 standalone: a Wi-Fi auditor in your pocket. No Flipper required. The dual-USB-C makes this work — power from a power bank, operate from the touchscreen.

13. References

Primary sources

Firmware projects

Flashing tools

Community guidance

Cross-references inside this project

  • Vol 9 § 2.3 of the Flipper Zero deep dive (catalog-form summary) — Hack Tools/Flipper Zero/03-outputs/html/vol09.html
  • Module ecosystem research notesHack Tools/Flipper Zero/02-inputs/volume_sources/research_notes/modules_owned.md
  • Cross-tool decision matrixHack Tools/_shared/comparison.md
  • Lab legal/ethics rulesHack Tools/_shared/legal_ethics.md

End of deep dive. Maintainer: tjscientist. Last updated 2026-05-12. Substantial 2026-05-12 revision: corrected the “no microSD” claim (slot exists, Marauder v1.8.4+ writes to it); substantially expanded § 5.1 Marauder coverage (v1.12.1 catalogue, BLE-spam variants, touchscreen navigation, command recipes, companion-FAP detail); added § 8 standalone-operation + Dual Board Battery Backpack + power-input safety advisory; rewrote § 7.4 logs-exfil for SD workflow; renumbered §§ 9–13 to make room. If hardware or firmware facts change (V4 release, Marauder major version, Ghost ESP gaining SD support on AWOK class, AWOK publishing a V3 schematic), update both this file and Vol 9 § 2.3.