What is Flipper Zero?

Flipper Zero is a portable cybersecurity tool designed for exploring, testing, and learning about a wide range of technologies. It supports:

  • Sub-GHz communication (for remote control emulation)

  • RFID and NFC scanning/emulation

  • Infrared (IR) remote simulation

  • GPIO interface for connecting to external hardware

  • iButton, BadUSB, Bluetooth, and more

It’s widely used for ethical hacking, pentesting, and automation in everyday tech environments.


What You Need to Get Started

  • Flipper Zero device (official or trusted reseller)

  • USB-C cable for charging and data transfer

  • microSD card (for storing IR remotes, signal captures, etc.)

  • qFlipper software (for firmware updates)

  • (Optional) Wi-Fi dev board for wireless updates and remote access


First-Time Setup (Step-by-Step)

  1. Charge your Flipper Zero fully before first use.

  2. Download qFlipper from the official Flipper site.

  3. Update firmware by connecting your Flipper via USB and running qFlipper.

  4. Explore the menu, customize settings like your device name, time zone, and brightness.

  5. Insert microSD card to enable full features (Flipper uses it to store signals, payloads, and logs).


Exploring Core Functions of Flipper Zero

Flipper Zero is packed with powerful features for exploring, hacking, and testing a wide range of technologies. Below is a detailed breakdown of its core functions and how to use them effectively.

1. Sub-GHz: Remote Control Exploration

Flipper Zero’s Sub-GHz capabilities allow it to capture and emulate signals from devices that use sub-GHz frequencies. This is particularly useful for remote control applications like garage doors, security systems, and other remote devices.

Steps to Use Sub-GHz:

  1. Select Sub-GHz mode on the Flipper Zero main menu.

  2. Choose the frequency range: Flipper supports frequencies from 300 MHz to 928 MHz (region dependent).

  3. Capture a Signal: Place Flipper near the remote control you want to capture (e.g., a garage door remote).

    • Press the button on the remote.

    • Flipper will automatically detect and save the signal.

  4. Emulate the Signal: After capturing, you can send the signal back to the device by selecting it from your saved signals.

    • Use the “Transmit” option to send the signal and test if the device responds.


2. RFID/NFC: Scan Cards and Emulate Access

Flipper Zero supports reading and emulating low-frequency (125 kHz) RFID cards and NFC (13.56 MHz) tags. This is useful for testing access control systems and experimenting with RFID security.

Steps to Use RFID/NFC:

  1. Select RFID/NFC mode on Flipper Zero’s main screen.

  2. Scan an RFID Card: Hold the RFID card close to the Flipper Zero.

    • The device will display the card's unique ID.

  3. Clone the Card: If you want to clone the card, press the “Clone” option on the screen. This will save the card's data.

  4. Emulate the Card: Once the card is cloned, you can emulate it by selecting the saved card and pressing “Emulate”. Hold Flipper near the RFID scanner to unlock doors or access restricted areas (if permitted).

  5. Read NFC Tags: For NFC (13.56 MHz) tags, use the same steps to scan and clone NFC tags for testing.


3. Infrared: Control TVs and Devices

Flipper Zero has built-in infrared (IR) capabilities, allowing you to store and send IR commands to control devices like TVs, air conditioners, and other household electronics.

Steps to Use Infrared (IR):

  1. Select IR mode on the Flipper Zero menu.

  2. Capture IR Signals: Point Flipper Zero at the IR remote control (e.g., TV remote) and press a button on the remote. Flipper will learn the signal.

    • Save the signal to the internal memory for later use.

  3. Send IR Commands: To control the device, select the saved IR remote from the menu, and press the corresponding button (e.g., Volume Up, Channel Change).

  4. Store Multiple IR Remotes: You can store various remotes (TV, AC, etc.) and select them when needed.


4. GPIO: Hardware Hacking 101

The GPIO (General Purpose Input/Output) pins on Flipper Zero allow you to interact with external hardware components, including microcontrollers, sensors, and other embedded systems. This is essential for hardware hacking projects and learning about electronics.

Steps to Use GPIO Pins:

  1. Access GPIO Pins: On the Flipper Zero menu, navigate to the “GPIO” option.

  2. Connect External Components: Using jumper wires, connect the GPIO pins to your external components (e.g., sensors, LEDs, microcontrollers).

  3. Configure GPIO Settings: You can configure the pins for various functions such as UART, SPI, or I2C communication by selecting the appropriate settings in Flipper.

  4. Interact with Microcontrollers: Use the GPIO interface to send signals to microcontrollers (e.g., Arduino, Raspberry Pi) and control sensors or read data from them.

  5. Test Circuits and Sensors: You can use Flipper to test simple circuits, measure voltages, or control actuators (e.g., motors, relays).


5. BadUSB & iButton

Flipper Zero can act as a BadUSB device, allowing you to send payloads when plugged into a computer (like the Rubber Ducky script). Additionally, it can emulate iButton keys, which are commonly used in access control systems and digital locks.

Steps to Use BadUSB:

  1. Prepare Payload: Use a pre-existing script or create your own payload in the text editor on Flipper Zero. The payload could automate keystrokes, execute commands, or open URLs.

  2. Plug into Computer: When you connect Flipper Zero to a USB port, it will execute the stored payload automatically (just like a Rubber Ducky).

  3. Test and Modify: If the payload does not work as expected, modify the script and retry until it works properly.

Steps to Emulate iButton:

  1. Select iButton mode on Flipper Zero.

  2. Read an iButton: Hold the iButton near the Flipper Zero device to read its unique ID.

  3. Emulate iButton: After saving the iButton data, you can use the Flipper Zero to emulate it at access points that support iButton authentication (e.g., digital locks, login tokens).


Installing Custom Firmware (Optional but Powerful)

Using custom firmware like Unleashed or RogueMaster unlocks extra features:

  • Custom plugins

  • Games

  • Signal jammers (for educational use only)

Steps:

  1. Backup your device.

  2. Download the custom firmware.

  3. Flash via qFlipper or DFU mode (advanced users).


Fun and Ethical Projects to Try First

  • Emulate your garage door remote using Sub-GHz

  • Clone your office RFID badge (if allowed)

  • Control your TV with Flipper's IR

  • Send harmless USB payloads for testing

  • Read environmental data via GPIO-connected sensors

Reminder: Always have permission before testing security systems.


Common Issues & Troubleshooting Tips

  • IR not working? Ensure line-of-sight and use in low light.

  • Firmware errors? Reflash using qFlipper.

  • qFlipper not detecting device? Check cable and USB port.

  • NFC/RFID not reading? Try flipping the card/tag orientation.


Best Resources to Learn More


Final Thoughts

Flipper Zero in 2025 is more than just a fun gadget—it’s a powerful, educational tool for anyone exploring cybersecurity and embedded systems. By following this guide, you’ll quickly get familiar with its features, capabilities, and responsible usage. Always use Flipper for ethical testing and research, and you’ll unlock a world of possibilities.

For a related tutorial on using Flipper Zero to control public jukeboxes, check out the detailed guide on how to control TouchTunes with Flipper Zero.

FAQs

What is Flipper Zero used for?

Flipper Zero is used for learning, testing, and experimenting with digital signals, including RFID, Sub-GHz remotes, NFC, IR, and more. It’s great for ethical hacking and automation.

Can Flipper Zero be used illegally?

Yes, like any tool, it can be misused. However, it’s designed for ethical use. Always get permission before testing systems.

Is Flipper Zero beginner-friendly?

Yes! With a simple interface and growing community support, it’s perfect for beginners interested in cybersecurity and electronics.

Do I need custom firmware?

Not necessarily. The stock firmware is great, but custom firmware unlocks advanced features and community-created tools.