DSTIKE Hackheld · Volume 1

DSTIKE Hackheld Volume 1 — Overview & the DSTIKE Story

What it is, who built it, where it sits in Jeff's lineup, and how to read this twelve-volume reference

Contents

SectionTopic
1What this device is
2Who built it
3The Spacehuhn lineage
4Jeff’s unit at a glance
5Where the Hackheld sits in the lineup
6What this twelve-volume series covers
7How to read this series
8Conventions
9What’s next

1. What this device is

The DSTIKE Hackheld is a pocket-sized standalone Wi-Fi attack and audit handheld built around the Espressif ESP8266 microcontroller. It runs out of the box on Stefan Kremser (“Spacehuhn”)‘s open-source WiFi Deauther firmware — an Arduino-based codebase that turns the ESP8266 into a self-contained 802.11 packet-injection platform with a web UI, a serial CLI, and three primary attacks (deauth, beacon spam, probe spam) plus a scanner.

The hardware envelope is small and intentionally simple:

  • A 0.96″ monochrome OLED for menus, scan results, and attack status.
  • A cluster of tactile buttons — on Jeff’s V1 board, seven of them: a 4-way navigation diamond, two labelled keys (A and B), and a dedicated reset.
  • A USB-C port for charging and serial-over-USB to a host computer.
  • A 1000 mAh LiPo cell for untethered field use.
  • A clear-cast resin or acrylic shell exposing the distinctive purple PCB.

The device is the embodiment of an early hacker-toolbench truism: the ESP8266 is shockingly capable for what costs $3 of silicon. Spacehuhn proved it in 2017 with the original Deauther proof-of-concept; DSTIKE built the productised handheld around it. The Hackheld V1 (purple-PCB era) is Jeff’s specific unit.

Jeff's DSTIKE Hackheld V1, front view — purple PCB, "DSTIKE Hackheld" silkscreen banner at the top, 0.96″ OLED, and the seven-button cluster (4-way diamond + A/B + reset). The clear acrylic case sh…
Jeff's DSTIKE Hackheld V1, front view — purple PCB, "DSTIKE Hackheld" silkscreen banner at the top, 0.96″ OLED, and the seven-button cluster (4-way diamond + A/B + reset). The clear acrylic case shows the corner screws and the cast resin rim.

Figure 1.1 — DSTIKE Hackheld V1, front. Jeff’s own photo, 2026-05-15.

2. Who built it

DSTIKE is the trade name of Travis Lin (林晨), a Shanghai-based hardware designer who builds and sells small-batch security and tinkerer hardware out of his Tindie store (tindie.com/stores/lspoplove) and his own site (dstike.com). DSTIKE has shipped a long line of ESP8266- and ESP32-based handhelds since 2017 — the original D-duino, the early Deauther 1.x board with a 3-button cluster, the Watch wearable, several Deauther Hackheld revisions (Jeff’s purple V1 being the earliest in the named-Hackheld lineage), and more recent ESP32 builds.

The DSTIKE devices are not the same as the reference Spacehuhn boards. They are productised — they ship in a case, with a battery, with the firmware pre-flashed, with appropriate antennas and PA stages built in. That last point matters: the silkscreen on Jeff’s RF module reads “PA = 25 dBm”, meaningfully above the bare ESP-12-F’s ~20 dBm. The added power amplifier extends realistic working range from the bare-chip’s ~10–20 m to a more useful ~50–100 m line-of-sight (regulatory and antenna factors permitting — see Vol 12 § Legal).

3. The Spacehuhn lineage

The firmware Jeff’s unit ships with is open-source. It descends from a multi-year project by Stefan Kremser (“Spacehuhn”), a German hacker / educator / YouTuber who released the esp8266_deauther repo in 2017 (github.com/SpacehuhnTech/esp8266_deauther, MIT-licensed). The original release was a proof-of-concept that the ESP8266’s closed-source Wi-Fi blob could in fact transmit IEEE 802.11 deauthentication and probe-request frames — a feature Espressif had not officially supported but which the community found by reverse-engineering the SDK.

The lineage of relevant Deauther releases:

YearReleaseWhat it added
20171.0 — 1.6Original proof-of-concept; bare CLI; no web UI. The codebase that proved the ESP8266 could emit raw deauth and probe frames.
20182.0Full rewrite. Adds the web UI (http://192.168.4.1), the scanner / attack / station / SSID page tabs, persistent storage of named target lists in SPIFFS, JSON-over-HTTP control plane.
2019–20202.1 — 2.5Stability + display drivers + button bindings for the wide variety of DSTIKE-class handhelds that emerged.
20212.6.1Jeff’s current firmware. Mid-2021. Refinements to the AP/station scanner, more reliable probe-spam, OLED rendering improvements.
2022–20242.7.xCurrent line. Bug fixes, default-channel changes, Arduino-ESP8266 core 3.x compatibility.

Spacehuhn’s repo also branched out: a Deauther fork for the ESP32 (which has independently developed into the ESP32 Marauder ecosystem — see ../ESP32 Marauder Firmware/ for the full deep dive on that branch), the ESP-Watch wearables, and a long tail of educational sub-projects (the pcap-tools repo, WiFiDuck, lolfetch, etc.). For this device, the canonical upstream is SpacehuhnTech/esp8266_deauther and the relevant branch is the master of v2.x.

4. Jeff’s unit at a glance

Captured from the photos in 00-inventory/photos/ (Front, Back, Back-Zoomed) and from Jeff’s stated firmware version:

ItemValue
ModelDSTIKE Hackheld V1 (purple PCB era)
RF/MCU moduleDSTIKE WiFi+ ESP8266MOD with PA = 25 dBm onboard
Display0.96″ 128×64 monochrome OLED (SSD1306, I²C)
Buttons7 — 4-way navigation diamond + A + B + RESET
USBUSB-C — charge + serial
USB-to-serial ICCH340-class (small QFN on back PCB)
BatteryZON.CELL 1000 mAh 3.7 V 3.7 Wh LiPo (Standard GB/T18287) on JST PH 2-pin
Charge ICTP4056-class (assumed; confirm by silk)
Stock firmwareSpacehuhn esp8266_deauther v2.6.1
Default Wi-Fi credentialsSSID pwned, password deauther, gateway 192.168.4.1
Acquired(pending — record on next inventory update)
Statusactive, lab unit

Vol 3 unpacks the hardware one component at a time. Vol 4 unpacks the power / battery / USB-serial subsystems.

5. Where the Hackheld sits in the lineup

The Hack Tools hub has a long list of Wi-Fi-capable platforms by 2026. Where does this one fit?

PlatformYear of siliconOwner statusStandalone?5 GHz?BLE?Notes
DSTIKE Hackheld V1 (this)ESP8266 (2014)OwnedYes (OLED + buttons + battery)NoNoProgrammable open-source; smallest standalone Wi-Fi platform in the lineup
Flipper Zero WiFi DevboardESP32-S2 (2020)OwnedTethered to a Flipper, or via USB-CNoNo (BLE 4.2 only)First-party Flipper accessory; Marauder runs here
AWOK Dual Touch V3Dual ESP32-WROOM (2017 silicon)OwnedMounted on a Flipper or USB-poweredNoYes (BLE 4.2)Touch UI + GPS + wardriving focus
Ruckus Game OverESP32-S3 (2021)OwnedMounted on a Flipper or its own USB-CNoYes (BLE 5)OLED + joystick + sub-GHz daughter slot
ESP32 Marauder (firmware)ESP32 familyFirmware only; runs on owned hardware aboven/aNo (mostly)YesStefan Kremser’s spiritual successor
AWOK ESP32 C5 (aspirational)ESP32-C5 (2024)AspirationalTBDYesYesCloses the 5 GHz gap
Wired Hatters Banshee (aspirational)ESP32-C5 + ESP32-S3AspirationalYesYesYesFlagship multi-MCU pentest

The Hackheld’s unique seat at this table:

  1. It’s the only owned Wi-Fi platform that runs without a host. Marauder on the Flipper WiFi Devboard needs the Flipper to drive its UI. The Hackheld has its own OLED + buttons + battery. Drop it in a pocket and it operates on its own.
  2. It’s an open-source educational target. The Spacehuhn firmware is MIT-licensed, the Arduino-ESP8266 core is the friendliest “first embedded project” toolchain in existence, and the OLED + buttons are wired in a textbook way. The Hackheld is the write your own firmware from scratch device in Jeff’s lineup — Vol 10 and 11 of this series are entirely on that.
  3. It’s the smallest and lowest-power. ESP8266 idle draws single-digit mA; even active TX with the PA pulls under 300 mA. A 1000 mAh LiPo carries it for an hour of attack, or far more of scan-only operation.

What it can not do:

  • 5 GHz Wi-Fi (the chip is 2.4 GHz only).
  • BLE (no Bluetooth radio on the ESP8266).
  • Arbitrary 802.11 frame injection (only deauth / beacon / probe-request can be raw-emitted from this chip via the SDK).
  • Full WPA-handshake crack (the chip can capture handshakes but doesn’t have the CPU / RAM to crack one).

For those, the lineup has other platforms — see Vol 12 § Comparison.

6. What this twelve-volume series covers

The full table of contents across the series:

VolTopicWhy it’s there
1Overview & DSTIKE story (you are here)Orientation + lineage
2The ESP8266 substrateChip-level: silicon, RAM, GPIO, RF, monitor mode, packet injection capabilities and limits
3Board hardware walkthroughEvery component on Jeff’s actual board, photo-driven
4Power, battery, USB-serialThe 1000 mAh runtime envelope, charge cycle, brownout posture, CH340 enumeration
5Spacehuhn WiFi Deauther firmwarePrimary firmware deep dive: architecture, attack engines, data structures
6Web Interface — full users guideThe main users guide (per Jeff’s request) — every page, every button, troubleshooting
7CLI command referenceEvery serial command, syntax, scriptable examples
8Other firmwaresESP8266 Marauder port, ESPurna, Tasmota, NodeMCU, ESPHome, community forks
9Firmware update proceduresWeb flasher, esptool, Arduino, recovery from brick, downgrade procedures
10Writing your own code I — ArduinoArduino IDE + ESP8266 core + OLED + button libs + first sketch end-to-end
11Writing your own code II — advancedPlatformIO, async patterns, ESPAsyncWebServer, OTA, sample apps including a Spacehuhn fork
12Workflows, comparison, legal/ethics, cheatsheetOperational recipes + cross-tool comparison + legal posture + laminate-ready cheatsheet

Vols 5, 6, 10, 11 are the headline volumes Jeff explicitly called out (firmwares, web interface, writing your own code).

7. How to read this series

Three reading orders that work, depending on goal:

A — Field user (just wants to use the device). Vol 1Vol 5Vol 6Vol 9 (for upgrades) → Vol 12. Skip the rest until you hit something you can’t figure out.

B — Custom-code developer (wants to write firmware for the chip). Vol 1Vol 2Vol 3Vol 10Vol 11. Vol 5 and 7 are useful as the “this is what production firmware looks like” reference. Vol 9 is essential — you’ll be flashing constantly.

C — Engineer evaluating the platform (deciding whether to buy more of these, or whether to use one in a project). Vol 1Vol 2Vol 12 (comparison) → Vol 5 (capability ceiling) → Vol 11 (how custom code looks). Skip the user-guide volumes.

The series is internally cross-referenced — any volume that mentions a concept covered in detail elsewhere links to it. There is no required strict-order read.

8. Conventions

  • All dates are absolute ISO (2026-05-15), per the Hack Tools hub convention.
  • Inline code in monospace is exactly what to type or copy.
  • File paths relative to the Hack Tools/ root use forward slashes (Flipper Zero/CLAUDE.md) regardless of host OS.
  • Cross-tool references link by relative path so the file structure is portable (../../Flipper Zero/CLAUDE.md).
  • Hex addresses are written 0x0000 (lowercase x, leading zeros padded to chip-word-width where it aids reading).
  • Figure numbering is Vol.Section (e.g., Figure 5.2 = Volume 5, second figure).
  • Photos of Jeff’s own unit live in ../../00-inventory/photos/. Stock photos from Wikimedia Commons live in figs/ and carry verbatim credit lines per CC-BY / CC-BY-SA license.
  • “Verify on the bench” appears where a claim is based on documentation or my (Claude’s) understanding of the platform rather than hands-on measurement on Jeff’s specific unit — these are explicit invitations to bench-check before relying on the claim in production.

9. What’s next

Vol 2 — The ESP8266 Substrate unpacks the chip. Tensilica LX106 instruction set, 80 KB DRAM memory map, GPIO multiplexing, the 2.4 GHz radio’s monitor-mode capabilities, packet-injection what-works-and-what-doesn’t. Foundation for everything else in the series.