Flipper Zero: the pocket-sized multi-tool that hacks everything (and why governments hate it)

Flipper Zero: the pocket-sized multi-tool that hacks everything (and why governments hate it)

I watched a 19-year-old on TikTok change the channel on a bar TV using an orange plastic gadget while the bartender looked around for the remote. Twelve million views on that clip. Then I watched Canada's government announce they wanted to ban the gadget because it was supposedly being used to steal cars. Then I watched Amazon pull it off their store. Then I watched the company behind it report $80 million in 2023 revenue anyway.

Welcome to the Flipper Zero saga. $169 for a pocket-sized hacking multi-tool for pentesters and geeks. The most controversial consumer electronics product since someone figured out you could jailbreak an iPhone. Politicians hate it because they think it steals cars (it does not). TikTok loves it because you can do dumb pranks with infrared signals. And buried under all the noise is a genuinely useful open source tool that changed how security professionals do their job.

Here is what it actually does, what it absolutely cannot do no matter what social media tells you, and why entire governments lost their minds over a device with a cartoon dolphin on the screen.

What Flipper Zero is: hardware for geeks who like breaking things

Strip away the controversy and the Flipper Zero is a portable multi-tool device for wireless protocols and access control systems. Swiss Army knife for radio signals, basically. Reads RFID badges. Clones NFC cards. Captures and replays Sub-GHz remote signals. Fires infrared codes at every TV in range. All from a gadget the size of a fat candy bar with a pixel-art dolphin living on its lcd screen.

Alex Kulagin and Pavel Zhovner launched the Kickstarter in 2020. Raised $4.8 million, which was roughly 10x their goal. Flipper Devices Inc. shipped the first units in 2022. By 2025 they had moved over one million of them.

Here is what you get for $169:

Component Specification
Processor STM32WB55 (dual-core ARM)
RAM / Flash 256 KB / 1 MB
Display 128x64 pixel monochrome lcd
Battery 2,000 mAh LiPo
Sub-GHz radio CC1101 (300-928 MHz)
NFC ST25R3916 (13.56 MHz)
RFID 125 kHz reader/writer
Infrared Transmitter + receiver
Connectivity Bluetooth LE, USB-C, gpio pins
Storage microsd card slot
Size / Weight 100x40x25 mm / 104 grams
OS FreeRTOS (open source)

The directional pad and small screen make it look like a 90s Tamagotchi. That is intentional. The dolphin mascot evolves as you use the device. The more you hack, the happier your dolphin gets. Silly? Yes. Brilliant marketing for the hacker community? Absolutely.

What Flipper Zero can actually do

Let me walk through each module because the capabilities are genuinely impressive for a $169 gadget.

Sub-GHz radio. The CC1101 antenna picks up and transmits on frequencies between 300 and 928 MHz. This covers garage door openers, weather stations, remote-controlled gates, wireless doorbells, car key fobs using fixed codes, and dozens of other radio protocols. You point the Flipper at a remote, capture the signal, save it, and replay it later. I have seen people use this to control gates in their apartment complex after losing the original remote.

NFC at 13.56 MHz. The flipper zero has a built-in NFC module that reads contactless cards: transit passes, hotel keys, office badges, payment cards (partially). It can emulate some of these cards, acting as a clone. The nfc module works with MIFARE Classic, NTAG, and several other tag types.

125 kHz RFID. Older access badges, key fobs, and building entry cards often use 125 kHz. The Flipper reads, stores, and emulates these. Walk up to your office badge reader, tap your Flipper instead of your card, and the door opens. Useful when you forget your badge. Also useful for security testing.

Infrared. Flipper has a built-in ir transmitter and receiver. It comes preloaded with a massive database of infrared codes for TVs, air conditioners, projectors, soundbars, set-top boxes. Point it at any TV and try codes until one works. This is the feature that went viral on TikTok, people turning off TVs in public places. Harmless but annoying.

flipper zero

iButton and 1-wire. Some buildings use contact keys that look like metal buttons. The Flipper reads and emulates these through its ibutton connector. Old technology but still widely deployed.

BadUSB. Plug the Flipper into a computer via USB and it acts as a keyboard. It can type pre-written scripts automatically, running commands on the target machine. Pentesters use this to demonstrate how quickly a physical USB attack can compromise a workstation. The scripts use Ducky Script, the same language that the USB Rubber Ducky uses.

GPIO pins. The flipper has gpio pins that let you connect external modules, sensors, and debug tools. The video game module (a Raspberry Pi Pico add-on) turns it into a handheld game console. The WiFi dev board adds network scanning capabilities through an ESP32 chip. The gpio interface makes Flipper expandable in ways the base hardware was never designed for.

Bluetooth. BLE support allows the Flipper to communicate with phones and other Bluetooth devices. This module got attention after someone demonstrated Bluetooth Low Energy spam attacks at Midwest FurFest in September 2023, disrupting payment terminals and, more seriously, some medical devices in the area.

What Flipper Zero cannot do (despite what TikTok says)

The social media hype made Flipper sound like a universal hacking machine. It is not. Here is what it cannot do:

It cannot steal modern cars. Newer vehicles use rolling codes where every key press generates a unique encrypted signal. Capturing and replaying a rolling code does not work because the car has already moved to the next code in the sequence. Fixed-code systems from the 1990s and early 2000s are vulnerable. Anything made after 2005 with rolling codes? The Flipper cannot touch it.

It cannot clone encrypted NFC cards. Modern credit cards, newer transit passes, and most secure access badges use encrypted communication. The Flipper can read the UID (public identifier) but cannot extract the private keys needed to make a working clone. MIFARE DESFire, newer MIFARE Plus, and bank cards with dynamic CVVs are safe.

It cannot hack WiFi networks out of the box. The base Flipper has no WiFi hardware. The ESP32 dev board add-on can scan networks and run basic attacks, but calling it WiFi hacking is generous.

It cannot break through modern encryption. No brute-forcing WPA3 passwords. No decrypting AES-protected signals. The Flipper works with unencrypted or weakly encrypted protocols. Anything properly secured is beyond its reach.

The gap between what TikTok shows and what the device actually does is the source of most controversy. A teenager turning off a restaurant TV makes great content. A pentester finding that a corporate office still uses unencrypted 125 kHz badges for building access? That is the real use case that matters.

The controversy: bans, seizures, and government panic

Flipper Zero became the most controversial piece of consumer hardware since the lockpicking community went mainstream. Governments did not take it well.

In late 2022, US Customs seized 15,000 Flipper Zero units at the border. They were eventually released, but the seizure signaled that law enforcement saw the device as a potential threat. The FCC had no issues with it. Customs just wanted a closer look.

Amazon banned Flipper Zero from its marketplace in April 2023, classifying it as a "card skimming device." This was almost certainly wrong. The Flipper cannot skim card data in any meaningful way since it cannot extract private keys or dynamic CVVs. But Amazon's algorithms do not care about nuance, and the device disappeared from the platform.

Brazil's telecommunications regulator Anatel seized Flipper Zero shipments in 2023, blocking imports entirely. Brazilian buyers had to find alternative ways to get the device.

Gatwick Airport in the UK confiscated a Flipper Zero from a traveler in September 2023. Airport security apparently thought it was some kind of weapon. It measures 10 centimeters and has a cartoon dolphin on the screen.

The biggest showdown came in February 2024 when Canada announced plans to ban the Flipper Zero, linking it to car theft. The Canadian government's reasoning: car theft was increasing, Flipper Zero can interact with radio signals, therefore Flipper Zero is a car theft tool. Security researchers pointed out that the Flipper cannot beat rolling codes used in any car made in the last 20 years. The ban proposal was later walked back to targeting "illegitimate use" rather than the device itself.

A South Dakota Fusion Center police bulletin from August 2023 warned that extremists might use Flipper Zero to attack power infrastructure. Flipper Devices responded that modern power control systems are not vulnerable to the kinds of signals the Flipper transmits.

All of this panic has a common thread: regulators who do not understand the technology regulating it anyway. The Flipper Zero exposes insecurity that already exists. It does not create new vulnerabilities. If your office uses unencrypted RFID badges from 2005, that is your office's security problem. Banning the tool that reveals it does not fix the lock.

flipper zero

Custom firmware: Unleashed, Momentum, and the community

The official Flipper Zero firmware is deliberately conservative. It respects regional frequency restrictions and avoids features that could be classified as offensive. Some users wanted more.

Unleashed firmware removes regional frequency locks and adds sub-GHz protocols not included in the stock firmware. Momentum (formerly Xtreme) goes further with additional features, animations, and community-contributed protocol support. These custom firmwares are open source, community maintained, and easy to install via the Flipper's USB connection.

The Flipper app store (launched July 2023) adds another layer. Third-party developers build apps that extend the device's functionality. Everything from Bluetooth scanning tools to game emulators to specialized RFID utilities. The microsd card slot stores extra data, custom scripts, and firmware backups.

This open source ecosystem is what separates the Flipper from proprietary pentesting hardware that costs $500-$3,000. A professional Proxmark RFID tool runs $300+. A HackRF One for software-defined radio costs $300. A USB Rubber Ducky is $80. The Flipper does 80% of what these tools do, in one $169 package, with a community that keeps adding more.

The Flipper community on Discord and Reddit is one of the more active hardware hacking communities out there. People share custom scripts, protocol discoveries, and use case walkthroughs daily. The debate between official and custom firmware mirrors the jailbreak vs stock iOS argument. Official firmware keeps you legal everywhere and gets regular updates from the company. Custom firmware gives you tools that the company deliberately chose not to include. Most serious users install Unleashed or Momentum within the first week. The risk: custom firmware can violate local radio regulations since it removes the frequency restrictions that keep the official build compliant in different countries.

Who actually uses Flipper Zero (and who should)

Forget the TikTok pranksters. Here is who benefits from owning one:

Penetration testers use it on every engagement. Physical security assessments require testing badge clones, wireless access points, and USB attack surfaces. The Flipper covers all three without carrying a bag full of specialized equipment.

IT administrators test their own systems. Does the office NFC badge system use encryption? Does the conference room AV system accept any infrared command? Can someone walk up to a lobby terminal and run a BadUSB script? The Flipper answers these questions in minutes.

Students and hobbyists learn about radio protocols, hardware hacking, and embedded systems. The Flipper is an educational tool with enough depth to teach real security concepts. The gpio pins alone turn it into a basic logic analyzer and protocol debugger for electronics projects.

Home automation enthusiasts control devices from multiple brands with one gadget. If your garage uses 315 MHz and your ceiling fan uses infrared and your front gate uses 433 MHz, the Flipper handles all of them.

People who lose remote controls. Seriously. Program the Flipper with your TV's infrared codes and your gate's Sub-GHz signal and you never need another remote again.

Security researchers studying IoT vulnerabilities use it as a quick field scanner. Walk through a building and in 30 minutes you have mapped every wireless protocol in range: which badges use encryption, which doors run legacy RFID, which conference rooms have unsecured AV systems. That audit used to require a backpack full of gear. Now it fits in a pocket.

The sales numbers speak for themselves. Over one million units shipped by 2025. Revenue went from $25 million in 2022 to $80 million in 2023. That growth came from real demand across pentesting, education, and hobby markets, not just TikTok impulse buys. A lot of those units ended up in corporate security budgets next to Burp Suite licenses and Kali Linux installations.

Any questions?

The Flipper Zero is not a crypto wallet and cannot sign blockchain transactions. However, it has indirect security applications: testing NFC hardware wallets for vulnerabilities, verifying that your hardware wallet`s NFC communication is encrypted, and checking whether RFID-based access to crypto storage facilities is properly secured. Security researchers have used it to demonstrate weaknesses in physical security around server rooms and data centers where crypto infrastructure runs.

Some older parking barriers that use fixed-code 433 MHz or 315 MHz remotes can be opened by capturing and replaying the signal. Modern systems using rolling codes, encrypted fobs, or license plate recognition cannot be bypassed. Most parking garages installed after 2010 use rolling codes or server-validated tickets. If a parking barrier opens to a replayed Flipper signal, the barrier`s security was already broken long before the Flipper existed.

The dolphin mascot on the screen shows different emotions based on how you use the device. If you do not use it for a while, the dolphin looks sad or angry. Use the Flipper regularly to interact with different protocols and the dolphin gets happy and evolves. It is a gamification mechanic borrowed from Tamagotchi that encourages users to explore all the device`s features. Purely cosmetic but oddly motivating.

The M5StickC Plus and HackRF One cover some overlapping ground but lack the all-in-one form factor. A Proxmark3 handles RFID/NFC better but costs more and does nothing else. The PandwaRF is another option for Sub-GHz work. No single device matches the Flipper`s combination of features at $169. If you want just one capability (say, NFC only), you can find cheaper dedicated tools. But the multi-tool approach is what makes the Flipper worth the price.

The main limitations: it cannot defeat rolling codes used in modern cars and garages, it cannot clone encrypted NFC cards (credit cards, newer transit passes), it has no built-in WiFi, and it cannot brute-force strong encryption. The 125 kHz RFID reader works only with legacy systems. The Sub-GHz radio only captures unencrypted fixed-code signals. Battery life is around 7-10 days with normal use. Storage depends on the microsd card you install.

No. Flipper Zero is legal to buy, own, and use in the United States. The FCC has not restricted it. US Customs seized a shipment in 2022 but released it after review. Amazon removed it from their marketplace in 2023, but you can buy it directly from the official Flipper website (flipperzero.one) and from other retailers. Using the device to access systems without authorization is illegal under the Computer Fraud and Abuse Act, the same way owning a lockpick is legal but picking someone else`s lo

Ready to Get Started?

Create an account and start accepting payments – no contracts or KYC required. Or, contact us to design a custom package for your business.

Make first step

Always know what you pay

Integrated per-transaction pricing with no hidden fees

Start your integration

Set up Plisio swiftly in just 10 minutes.