Developer and engineer Oliver Fabel has developed a port that is designed to run MicroPython on the Flipper Zero. This port allows users to write programs for Flipper Zero in Python, instead of built-in JavaScript. Till now you can access GPIO, ADC, PWM, the speaker, buttons, the display, and infrared communication with this but it doesn’t have support for NFC or RFID yet, and it’s still under development. Previously we have written about various addon boards for the Flipper Zero like the Mayhem v2, the ESP8266 Deauther board, the CAN bus addon board, and other powerful alternatives of the Flipper like The M1 and the HackBat. Feel free to check those out if you are interested in the topic. The process is simple, and you don’t have to do a firmware update to work with MicroPython, you can download the application from the community-driven Flipper app store and are good […]
Mayhem v2 expansion for Flipper Zero adds Wi-Fi, BLE, camera, microSD card slot, and NRF24 or CC1101 radio support
Erwin Ried‘s Mayhem v2 is an all-in-one ESP32 and NRF24L01-based expansion board designed for Flipper Zero. This board adds Bluetooth and Wi-Fi through an ESP32-S module, features 2MP camera with flashlight, a microSD card slot, and support for either an NRF24L01 module (for sniffing and mousejacking) or a CC1101 module (for external radio communication). These features make this Flipper Zero add-on board useful for WiFi and Bluetooth penetration testing, motion detection, QR code reading, and as a nanny cam with remote access. Previously we have written about similar expansion boards like the Flipper Zero ESP8266 Deauther which adds de-authentication capabilities and the Flipper Add-On CANBus which can be used to sniff, send, and log CAN bus packets directly from the Flipper Zero. Feel free to check those out if you are interested in those tools. Mayhem v2 Flipper Zero add-on board specification Wireless Module – ESP32-S WiFi 802.11 b/g/n + […]
nRFBOX V2 ESP32 wireless hacking tool can scan, analyze, spoof, and jam the whole 2.4GHz spectrum
CiferTech has recently introduced the nRFBOX V2 ESP32-based wireless hacking tool designed for spectrum analysis, jamming, BLE device emulation, and more. The device is built around an ESP32-WROOM-32U module and includes an NRF24 module covering the whole 2.4GHz spectrum. Additionally, the device has a 0.96-inch OLED display, a five-way microswitch control pad, and a WS2812 RGB LED for feedback. The device can also be operated with a single 3.7V lithium battery, and that batter’s charging is handled by a TP4056 charging IC. All these features make this device useful for wireless security testing, educational environments, research, and hobbyist projects. Previously we have written about similar portable hacking tools like the DSTIKE Deauther Watch X, the HackBat pen-testing device, and the popular Flipper Zero wireless hacking tool. Feel free to check those out if you are looking for similar products. nRFBOX V2 specifications Microcontroller – ESP32-WROOM-32U with ESP32 dual-core wireless microcontroller […]
Flipper Zero hacking tool gets ESP8266 Deauther add-on for Wi-Fi security and research
PCB Studios has just launched the “Flipper Zero ESP8266 Deauther” adapter board for Flipper Zero that enables users to conduct de-authentication attacks on Wi-Fi networks. Running a modified version of SpacehuhnTech’s ESP8266 Deauther software, this board has a variety of actions for testing 802.11 wireless networks. Its primary function, deauthentication, sends deauthing packets to the target network, disconnecting devices from their 2.4 GHz Wi-Fi networks. In our last post about Flipper Zero, we wrote about Flipper Add-On CANBus a CAN bus hacking tool that can sniff, send, and log CAN bus packets. Other than that we have seen similar tools like the M1 multitool and HackBat which can be considered as Flipper Zero alternatives with STM32H5 and Raspberry Pi RP2040 MCUs and Wi-Fi connectivity. We have also written about various ESP8266 and ESP32-based Deauther tools like the DSTIKE Deauther Watch X, the Cheap Evil Tech Deauther board, and ESP32 Marauder […]
Flipper Zero hacking tool gets CAN bus add-on board for vehicle diagnostics and security research
Electronic Cats’ Flipper Add-On CANBus is a new add-on board for the Flipper Zero adding CAN bus communication to the popular wireless hacking tool. Built around the MCP2515 CAN controller chip this add-on card communicates with the Flipper Zero through an SPI interface. It allows users to sniff, send, and log CAN bus packets directly from the Flipper Zero, which means now you can analyze and manipulate CAN bus traffic for vehicle diagnostics, security research, and DIY projects. Previously we have seen Flipper Zero add an RP2040-powered video game module, and before that, we noted the developers launched their own app store with open-source apps. Additionally, we have written about Flipper Zero alternatives such as the M1 multitool so feel free to check those to know more about those solutions. Electronic Cats Flipper Add-On CANBus specifications Compatibility – Flipper Zero CAN Controller – Microchip MCP2515 CAN bus controller with SPI […]
Enabling Zigbee in Bluetooth LE temperature and humidity monitors from Xiaomi and Qingping using Telink TLSR8258 WiSoC
Qingping CGDK2 and Xiaomi LYWSD03MMC Bluetooth LE (BLE) temperature and humidity monitors based on Telink TLSR8258 can be switched to Zigbee thanks to a custom firmware flashed over-the-air. Telink TLS8258 is a multi-protocol wireless microcontroller supporting Bluetooth LE 5, Bluetooth Mesh, Zigbee, RF4CE, Thread, 6LoWPAN, HomeKit, ANT, and 2.4GHz proprietary and found in boards such as the LILYGO T-Zigbee and various products. Some products only enable one wireless protocol, for example, Bluetooth LE as in the just-mentioned Qingping and Xiaomi monitors, but “SmartHomeScene” has found out that it was possible to switch from BLE to Zigbee on those by simply updating the firmware. The Telink TLS8258 devices mentioned above will publish data over BLE every 10 minutes (unless humidity or temperature changes, in which case data is transmitted immediately) with the default firmware, but Zigbee can be enabled by using the pvvx custom firmware for the following models: Xiaomi LYWSD03MMC […]
LoLRa project – Transmitting LoRa packets without radio using CH32V003, ESP8266, or ESP32-S2 MCU
The LoLRa project is a firmware-only LoRa transmission open-source project that works without a Semtech radio and instead relies on an I2S or SPI interface (so not exactly bit-banging) to transmit data with microcontrollers such as WCH CH32V003, or Espressif Systems ESP8266 and ESP32-S2 microcontrollers. LoRa is a proprietary protocol by Semtech, but people have been trying to reverse-engineer the LoRa PHY for years, and this culminated with a LoRa GNU Radio SDR implementation last year. But CNLohr found out you don’t even need a radio to send LoRa packets and you can instead use SPI or I2S interfaces from general-purpose microcontrollers to send packets that can be decoded by commercial off-the-shelf LoRa gateways and other chips. The current implementation is designed for the ITU Region 2 (aka The Americas) targeting the 902-928MHz frequency band, but the code could be changed for Region 1 (EU, Russia, Africa) to target 863-870MHz […]
Some Raspberry Pi 5 boards can be overclocked up to 3.14 GHz (and run just fine)
The Raspberry Pi 5 is advertised as a single board computer with a CPU clocked up to 2.4 GHz, but some of the boards can run stably at a higher frequency, and Jeff Geerling found out one of his boards could be overclocked up to 3.14 GHz with no issues when running a stress test. The Raspberry Pi 5 already delivers a two to three-times jump in performance against the previous generation Raspberry Pi 4 SBC when clocked at 2.4 GHz, but some already overclocked their up to 3.0 GHz, and many thought it was the maximum limit. But a recent firmware release proved them wrong, as it turns out some Raspberry Pi 5 boards can boot at 3.2 GHz and run stably at 3.14 GHz with an adequate cooling solution. The voltage was also adjusted in the config.txt to more or less safe settings. Contrary to the photo above, […]