Description
Flipper Zero is a portable multi-tool for pentesters and security researchers. It combines sub-GHz radio, RFID/NFC reader/emulator, infrared transceiver, GPIO, iButton, and Bluetooth in a compact device.
Installation
BASH
# Official firmware
# Update via qFlipper desktop app or Flipper Mobile App
# Custom firmware (more features)
# Unleashed: https://github.com/DarkFlippers/unleashed-firmware
# RogueMaster: https://github.com/RogueMaster/flipperzero-firmware-wPlugins
# qFlipper CLI
qflipper --flash latest
Basic Usage
BASH
# Sub-GHz (300-928 MHz)
# Read → captures wireless signals (garage doors, remotes)
# Saved → replay captured signals
# Frequency Analyzer → find active frequencies
# RFID (125 kHz)
# Read → identifies and reads LF cards
# Saved → emulate saved cards
# Add Manually → create cards by ID
# NFC (13.56 MHz)
# Read → identifies card type, reads data
# Detect Reader → captures authentication from reader
# Emulate → act as card
# Infrared
# Universal Remotes → TV, AC, projector
# Learn New Remote → capture IR signals
# BadUSB
# Upload DuckyScript payloads
# Execute as USB keyboard on target
Advanced Usage
BASH
# BadUSB relay attack
# 1. Write DuckyScript payload
# 2. Plug Flipper into target computer
# 3. Executes keystroke injection
# GPIO
# UART bridge for serial debugging
# SPI/I2C for chip communication
# Logic analyzer
# Sub-GHz custom protocols
# Add .sub files for custom signal captures
# Brute force rolling codes (Flipper Unleashed)
# Mifare Classic attack
# NFC → Detect Reader → place on NFC reader
# Captures authentication nonces
# Cracks keys over multiple reads
# Full card dump and emulation
# iButton
# Read/emulate Dallas/Cyfral keys
# Common in building access systems
Common Workflows
BASH
# Physical pentest toolkit
# 1. Sub-GHz: Copy parking gate remotes
# 2. RFID: Clone access badges
# 3. NFC: Read/emulate payment terminals info
# 4. IR: Control displays, projectors
# 5. BadUSB: Deploy payloads on unlocked computers
# 6. GPIO: Debug IoT device UART