Skip to content

Stealth Firmware Update

Current Version: v1.2.2 (ATLAS Ready)

ATLAS requires Doppelgänger Stealth firmware v1.2.2 or higher for full compatibility.


Stealth Mode disables WiFi and serial debugging for counter-forensics and detective control avoidance. It reduces detectability in high-security areas where wireless detection measures are in place, and lowers power consumption by disabling the wireless AP, reducing CPU frequency, and slowing the main processing loop.

Enable or disable Stealth Mode using the Stealth Card, which can be programmed with custom values in ATLAS. The device supports separate stealth cards for HID Mode (bit length, facility code, card number) and Paxton Mode (hex value).


Download the latest firmware for your platform from the Downloads page.


Firmware updates are performed using prebuilt installers.

  • Doppelgänger Stealth device
  • USB-C cable
  • Computer (Windows, macOS, or Linux)
  1. Download the latest installer for your OS from the Downloads page
  2. Connect your Stealth device via USB-C
  3. Run the downloaded installer for your platform:

macOS:

Terminal window
chmod +x ./stealth_firmware_<version>_darwin_<arch>
./stealth_firmware_<version>_darwin_<arch>

Linux:

Terminal window
chmod +x ./stealth_firmware_<version>_linux_<arch>
./stealth_firmware_<version>_linux_<arch>

Windows: Run the .exe file directly.

  1. Select the suggested ESP32 serial port when prompted
  2. Follow on-screen instructions
  3. Device will automatically reboot when complete

On macOS, you may need to allow execution in System Settings → Privacy & Security if the binary was quarantined. Alternatively, remove the quarantine flag:

Terminal window
xattr -d com.apple.quarantine ./stealth_firmware_<version>_darwin_<arch>

USB drivers are typically not required for ESP32-S3. The updater automatically detects the product type and installs the appropriate firmware.


Flashing resets the device to factory defaults:

  • Reader Mode: Resets to HID Mode (default). If you were using Paxton Mode, you’ll need to reconfigure via the web interface.
  • Card Data: All stored card data is wiped.
  • WiFi Credentials: Reset to default (doppelgänger_XXXX). Reconfigure your custom SSID/password via the web interface.
  • Stealth Card: Reset to default values. Reconfigure via ATLAS or the web interface.

After flashing, connect to the device’s WiFi network (default SSID: doppelgänger_XXXX, password: UndertheRadar) and access the web configuration interface.

Change the default wireless credentials immediately. Navigate to the Configuration Page and select Modify Wireless Network.

Select HID Global or Paxton from the reader type dropdown. HID Mode processes standard Wiegand protocols (26-bit through 56-bit formats). Paxton Mode captures Net2 75-bit protocol frames with automatic decoding.

Configure the Stealth Card with custom values to enable/disable Stealth Mode in the field. The device is mode-aware and uses the appropriate stealth card configuration based on the current reader mode.

For OPSEC purposes, serial output over USB-C can be enabled or disabled from the Configuration Page.


  • Ensure USB-C cable supports data transfer (not charge-only)
  • Try a different USB port
  • Check that no other application is using the serial port
  • Do not disconnect during flashing
  • Retry the flash command
  • Contact [email protected] if issues persist