AntiHunter
AntiHunter Perimeter Defense Systems - DIGI Node Firmware
Install / Use
/learn @lukeswitz/AntiHunterREADME
[!NOTE] Standalone or for use with the AntiHunter Command Center.
Early Release - Beta version. Potential stability issues and unexpected behavior may exist in the process.
Table of Contents
- Overview
- Primary Detection Modes
- Sensor Integration
- Secure Data Destruction
- RF Configuration
- System Architecture
- Hardware Requirements
- Getting Started
- Mesh Command Reference
- API Reference
- Credits
- Disclaimer
News
Jan. 29 2026: Featured in Best 20 XIAO Projects in 2025.
Overview
AntiHunter is a low-cost, open-source distributed perimeter defense system for wireless network security and operational awareness. Built on ESP32-S3 with mesh networking, it creates a scalable sensor network for real-time threat detection, device mapping, and perimeter security.
The system combines WiFi/BLE scanning, GPS positioning, environmental sensors, and distributed coordination to provide a digital and physical "tripwire", transforming spectrum activity into actionable security intelligence.
<a href="https://www.tindie.com/stores/teamantihunter/"><img src="https://d2ss6ovg47m0r5.cloudfront.net/badges/tindie-mediums.png" alt="I sell on Tindie" width="150" height="78"></a>
Primary Detection Modes
1. List/Target Scan Mode
Maintain a watchlist of target MAC addresses (full 6-byte) or OUI prefixes (3-byte vendor IDs). AntiHunter sweeps WiFi channels and BLE frequencies, providing immediate alerts and detailed logging on detection.
- Target monitoring by MAC address or vendor OUI prefix
- WiFi-only, BLE-only, or combined scanning
- Global user-configurable allowlist
- Logs RSSI, channel, GPS coordinates, and device names to SD card
- Real-time alerts via web interface, command center, and mesh network
2. Triangulation/Trilateration (Distributed)
Experimental
[!TIP] Target RSSI above -80 will produce more accurate results.
Coordinates multiple nodes across a mesh network for precise location tracking. Each node simultaneously scans for a target, recording RSSI and GPS coordinates. Data is aggregated and forwarded over mesh for RSSI-based trilateration processing.
- Multi-node coordination across mesh network
- GPS integration from each contributing node
- RSSI-based weighted trilateration with Kalman filtering
- Outputs: Average HDOP, GPS coordinates, confidence, estimated uncertainty (m), GPS quality
- Google Maps link sent over mesh with details
<details> <summary>RF Environment Calibration and Distance Tuning</summary>Experimental T114 Support: Small buffer and slow speed causes latency. Heltec v3 recommended.
Passive Detection Range (ESP32 + 5 dBi Antenna)
Ranges assume passive scanning. Active transmission achieves greater distances.
Path loss model: distance = 10^((RSSI0 - RSSI) / (10 * n))
| Environment | WiFi n | BLE n | WiFi RSSI0 | BLE RSSI0 | Use Case | |-------------|--------|-------|------------|-----------|----------| | Open Sky | 2.0 | 2.0 | -23 dBm | -60 dBm | Clear LOS, minimal obstruction | | Suburban | 2.7 | 2.5 | -24 dBm | -62 dBm | Light foliage, scattered buildings | | Indoor | 3.2 | 2.9 | -25 dBm | -65 dBm | Typical indoor, some walls | | Indoor Dense | 4.0 | 3.5 | -27 dBm | -69 dBm | Office spaces, many partitions | | Industrial | 4.8 | 4.0 | -30 dBm | -73 dBm | Heavy obstruction, machinery |
Distance Tuning (Target-Specific)
Fine-tune calculated distances per target using multipliers (0.1x - 5.0x):
- < 1.0: Target appears closer (increase sensitivity) -- e.g., 0.5x = 2x closer
- > 1.0: Target appears farther (reduce false positives) -- e.g., 2.0x = 2x farther
- Default: 1.0x (no adjustment)
3. Detection and Analysis Sniffers
A. Device Scanner
Captures all WiFi and Bluetooth devices in range. Records MAC addresses, SSIDs, signal strength, names, and channels for complete 2.4GHz spectrum visibility.
<img width="869" height="454" alt="Device Scanner" src="https://github.com/user-attachments/assets/c8a5d38b-9020-48c9-8bc4-f22d7c64a8df" />B. Baseline Anomaly Detection
[!TIP] A longer initial scan will produce more reliable detection behavior
Two-phase scanning: establishes baseline, then monitors for anomalies (new devices, disappearances, reappearances, significant RSSI changes). Configurable RAM cache (200-500 devices) and SD storage (1K-100K devices, defaults to 1500 without SD). Persistent storage with automatic tiering survives reboots.
Use cases: distributed "trail cam" for intruders, perimeter security, surveillance detection, threat identification.
<img width="870" height="346" alt="Baseline Detection" src="https://github.com/user-attachments/assets/6204a8e5-418d-49fd-b99c-c1d9c31ee3f2" />C. Deauthentication Attack Scan
WiFi deauth/disassoc attack sniffer with frame filtering, real-time detection, and integration with randomization tracking for source identification.
<img width="858" height="382" alt="Deauth Detection" src="https://github.com/user-attachments/assets/1b1e77db-a479-4cfd-beae-e13a7187cae4" />D. Drone RID Detection
Identifies drones broadcasting Remote ID (FAA/EASA compliant). Supports ODID/ASTM F3411 protocols (NAN action frames and beacon frames), French drone ID format (OUI 0x6a5c35). Extracts UAV ID, pilot location, and flight telemetry. Sends immediate mesh alerts and logs to SD card and two API endpoints.
E. MAC Randomization Correlation
Experimental
[!TIP] Use the Privacy button at the top of the results pane if sharing screenshots
Traces device identities across randomized MAC addresses using behavioral signatures: IE fingerprinting, channel sequencing, timing analysis, RSSI patterns, and sequence number correlation. Assigns unique identity IDs (T-XXXX) with persistent SD storage.
- Up to 30 simultaneous identities with up to 50 linked MACs each
- Dual signature support (full and minimal IE patterns)
- Confidence-based linking with threshold adaptation
- Detects global MAC leaks and WiFi-BLE device correlation
Use Cases
- Perimeter security and intrusion detection
- WiFi penetration testing, security auditing, and MAC randomization analysis
- Device fingerprinting and persistent identification across randomization
- Counter-UAV operations and airspace awareness
- Event security and monitoring
- Red team detection and defensive operations
- Wireless threat hunting, forensics, and privacy assessments
Sensor Integration
| Sensor | Interface | Description |
|--------|-----------|-------------|
| GPS | UART2 (RX=GPIO44, TX=GPIO43) 9600 baud | TinyGPS++ NMEA parsing. Location, altitude, satellite data. API at /gps. |
| SD Card | SPI | Logs to /antihunter.log with timestamps, MACs, RSSI, GPS. Web interface shows storage stats. |
| Vibration/Tamper | SW-420 (interrupt) | Interrupt-driven with 3s rate limiting. Mesh alerts with GPS and timestamps. |
| RTC | DS3231 via I2C | NTP sync on flash, fallback to system time and GPS. Drift correction. All timestamps UTC. |
Secure Data Destruction
Tamper detection and emergency data wiping to protect data from unauthorized access.
- Auto-erase on tampering: Configurable vibration-triggered destruction (disabled by default)
- Setup delay: Grace period after enabling to complete deployment
- Manual secure wipe: Via web interface
- Remote force erase: Mesh-commanded with token authentication (5-min expiry, device-specific)
- Obfuscation: Creates a dummy IoT weather device config after wipe
<details> <summary>Auto-Erase Configuration Parameters</summary>Warning: Data destruction is permanent and irreversible. Configure thresholds carefully.
| Parameter | Range | Description | |-----------|-------|-------------| | Setu
Related Skills
healthcheck
342.5kHost security hardening and risk-tolerance configuration for OpenClaw deployments
node-connect
342.5kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
prose
342.5kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
frontend-design
85.3kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
