Skip to content

Personfu/CyberFlipper

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

96 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CyberFlipper / CyberCard

Personfu @ FurulieLLC -- unified Flipper Zero custom firmware kit + CyberCard identity-and-RF wallet system.

This single repository contains two cohesive product lines that share one safety doctrine, one telemetry surface (fllc.net), and one threat model:

  1. CyberFlipper -- Flipper Zero F-series custom SD card distribution: BadUSB CVE awareness payloads, NFC, Sub-GHz, 125 kHz RFID, IR, U2F, dolphin assets, Wi-Fi dev board portal demos, Lab401 catalog integration, and the full HTML/JS dashboard at personfu.github.io/CyberFlipper/.
  2. CyberCard -- premium metal NFC/QR/AR business card + ESP32-S3 wallet device + Next.js web/API stack (/tap, /risk, /challenge, /dashboard, Supabase + Resend + Stripe). Lives under CYBERCARD/.

Both halves implement the same Personfu authorization gate: consent-first scannables, audit-everything, no credential-capture portals, no CVE droppers, no auto-execute payloads. Authorized blue-team / DEFCON / lab use only.


Concept Gallery

Vector renders + schematics in the FLLC.net theme. Sources in CYBERCARD/docs/assets/.

Front concept
Card front concept
Back schematic
Back NFC coil + QR
Exploded view
Mechanical exploded view
PCB stackup
4-layer PCB stackup
Coil geometry
NFC coil geometry + Wheeler math
Block diagram
System block diagram
RF spectrum
RF spectrum coverage
Power
Power architecture + budget
Tap flow
Tap-to-revenue sequence
Threat model
STRIDE threat model
Scannables
Scannable identity vectors
AR
AR overlay (WebXR)
Wi-Fi board
Flipper Wi-Fi dev board pinout (ESP32-S2)

Repo Map

CyberFlipper/
├── README.md                            # this unified doc
├── CYBERFLIPPER_Logo.png
├── CYBERFLIPPER-v1.2.1-SD_CARD.zip      # Flipper SD card distribution (release artifact)
├── CYBERFLIPPER-v1.2.1-UPDATE.zip       # Flipper update bundle
├── CYBERFLIPPER-v1.2.1-SD_CARD/         # expanded SD card tree
├── SD_CARD_READY/                       # ready-to-copy SD card payload set
├── badusb/                              # CVE-awareness BadUSB payloads (auto-generated)
├── nfc/                                 # NFC card dumps + research
├── subghz/                              # Sub-GHz signal captures + research notes
├── lfrfid/                              # 125 kHz RFID dumps
├── infrared/                            # IR remote universal databases
├── u2f/                                 # U2F key assets
├── dolphin/                             # Dolphin animation pack
├── apps/                                # .fap apps (Wi-Fi/RF/BLE/SubGHz/Games/GPIO/NFC)
├── firmware/                            # firmware source mirrors
├── dist/                                # build outputs
├── docs/                                # project docs (LEGAL, install, hardware)
├── images/, assets/                     # web/dashboard assets
├── web/                                 # GitHub Pages dashboard
├── third_party/                         # vendor sources
├── legacy/                              # legacy artifacts
├── scripts/                             # build/release scripts
├── manifest.json, manifest.txt          # release manifests
├── update.fuf, update.txt, updater.bin  # Flipper update files
├── radio.bin, splash.bin, firmware.dfu  # Flipper binaries
├── resources.tar (.bak)                 # Flipper resources tarball
├── inspect_tar.py, test_tar.py          # tar diagnostics
├── .github/, .gitea/                    # CI workflows
└── CYBERCARD/                           # CyberCard identity system
    ├── package.json, tsconfig.json, next.config.mjs, tailwind.config.ts, .env.example
    ├── app/                             # Next.js routes (tap, risk, challenge, dashboard, api/*)
    ├── lib/supabase/server.ts
    ├── docs/                            # 19+ deep-dive docs
    ├── firmware/cybercard_v0.ino        # ESP32-S3 + PN5180 + CC1101 prototype
    ├── flipper/                         # safe Flipper integration files
    ├── payloads/scannables/SCANNABLES.md
    ├── ar/index.html                    # A-Frame AR identity scene
    ├── emails/templates.tsx             # Resend / React Email
    ├── n8n/                             # tap-to-revenue workflow
    ├── modules/                         # display/input/IMU/network/identity modules
    ├── scripts/                         # NDEF generator + Proxmark mirror tool
    └── supabase/                        # DB migrations + RLS

Two Halves, One System

Concern CyberFlipper (root) CyberCard (CYBERCARD/)
Form factor Flipper Zero + Wi-Fi dev board Metal business card + ESP32-S3 wallet device
Distribution qFlipper SD card copy NFC tap / QR / AR / Wi-Fi portal
RF surface CC1101, ST25R3916, 125 kHz, BLE 5.4 PN5180, NTAG216, CC1101 module, Wi-Fi/BLE
Backend static GitHub Pages dashboard Next.js app on fllc.net + Supabase + Stripe + Resend
Audit local SD card events, manual review realtime tap_events + device_telemetry + dashboard
Public URL personfu.github.io/CyberFlipper/ fllc.net/tap and fllc.net/risk
Safety boundary CISA KEV-derived BadUSB payloads for awareness, no live exploitation consent-first scannables, no credential capture, no auto-execute

The CyberCard /tap flow is replicable from any CyberFlipper surface: a Flipper NFC card, a Wi-Fi captive portal, a printed QR, or a HID demo can all land on the same https://fllc.net/tap?card_id=...&utm_source=... URL and produce the same audit row.

Fast Start

CyberFlipper SD card distribution

  1. Download CYBERFLIPPER-v1.2.1-SD_CARD.zip from the Releases page.
  2. Extract -- you will see badusb/, infrared/, nfc/, subghz/, lfrfid/, dolphin/, apps/, u2f/.
  3. Open qFlipper -> connect Flipper via USB -> SD Card tab.
  4. Drag the extracted folders onto the SD card root.
  5. Eject and reboot.

No firmware flashing is required or supported. SD card content copy only.

CyberCard web/API app

cd CYBERCARD
cp .env.example .env.local
npm install
npm run dev

Then visit http://localhost:3000/tap?card_id=demo_v1&utm_source=local&utm_medium=dev to exercise the tap flow. See CYBERCARD/README.md for the full hardware engineering, RF math, and deployment guide.

Authorized Use

This repository is for owned hardware, lab environments, consent-based demos, security education, and defensive validation. It does not include instructions for unauthorized exploitation, credential theft, stealth, persistence, or evasion. Sub-GHz transmissions and Wi-Fi captive portals must be operated only on owned hardware, owned spectrum, and owned networks; ham bands require a licensed operator. See CYBERCARD/docs/AUTHORIZED_USE_POLICY.md.


CYBERFLIPPER F-SERIES

[ CYBERFLIPPER: PRODUCTION RELEASE v1.1.0 ]
Maintained by Personfu @ fllc.net
Official Discord: discord.gg/Cd9qyvht7X

PCB MCU CC1101 Status Repo


▓▒░ I. HARDWARE SCHEMATIC ARCHITECTURE

CYBERFLIPPER operates natively on the official MAIN_PCB_12.1.F7B9C6 framework. It exploits the dual-core STM32WB55 microprocessor, pushing the limits of the embedded CC1101 transceiver and physical HID bus arrays to create an autonomous, pocket-operable signal intercept pipeline.

(For raw engineering blueprints, cross-reference the official Flipper Development Hardware Schematic).

graph TD
    A[STM32WB55 Dual-Core MCU] -->|SPI| B(CC1101 Transceiver)
    A -->|I2C| C(NFC / 13.56MHz Coil)
    A -->|L-C Resonator| D(125kHz RFID Array)
    A -->|Diode Array| E(Infrared Transmitter)
    A -->|Pin 1-18| F(GPIO FPC Header)
    A -->|1-Wire| G(iButton Reader)
    A -->|Type-C PHY| H(BadUSB / U2F)
    B -->|SMA Antenna| I[Sub-GHz Spectrum]
    F -->|UART/SPI/I2C| J[External CyberDeck Arrays]
Loading

▓▒░ II. PROTOCOL VECTORS & TELEMETRY MATRIX

Vector Internal Silicon Driver Attack / Capture Simulation Capabilities
Sub-GHz CC1101 Transceiver Operates <1GHz. Overrides ASK/OOK/GFSK/MSK. Captures/Synthesizes rolling codes (Keeloq, Somfy). Includes deep-passive listening nodes.
125 kHz RFID LF L-C Tuned Circuit Emulates low-frequency proximity gates (HID Prox, EM4100, Indala).
NFC (13.56 MHz) ST25R3916 Controller Parses MIFARE Classic/Ultralight, NTAG architectures, ISO-14443A/B, and FeliCa transit layers.
Infrared Vishay TSSP / Diodes Harvests ambient carrier frequencies. Modded universal dictionaries control HVAC / AV topologies.
GPIO & Modules 3.3V FPC Header Raw interface for UART (Pin 13/14), SPI (Pin 2/3/4/5), and I2C arrays to host external modules.
iButton 1-Wire Interface (Pin 17) Physical emulation of Dallas Contact memory (DS1990A). Replicates magnetic constraint locks.
Bad USB Type-C USB PHY Enumerates as standard Human Interface Device (HID). Executes Tier-8 hyper-speed .txt injection vectors (RubberDucky).
U2F STM32 Crypto Engine Fully validated FIDO U2F hardware cryptography key for authenticating advanced reverse-shells.
Video Game Mod ESP32 / RP2040 Video-out framework repurposed for advanced Wi-Fi penetration staging or secondary external display mapping.

▓▒░ III. EDC ECOSYSTEM & TITAN MODULARITY

CYBERFLIPPER serves as the core bridging microcontroller representing the "Swiss Army Knife of cybersecurity tools" for an extensive Everyday Carry (EDC) loadout. We integrate directly with the greatest external penetration hardware on the market:

  • Wireless Exploitation:
  • Rogue Signal & IMSI Detection:
    • 🕵️‍♂️ Nyan Box: Correlates Axon Camera network density to passively track law enforcement grids.
    • 📱 Ray Hunter: Verizon hotspot mod specifically dedicated to Stingray (Cell-Site Simulator) detection and IMSI catcher awareness.
  • Captive Portals & Micro-Computing:
    • 😈 M5Stick S3: Running the "Evil" educational project for rapid captive-portal phishing emulation.
    • 🖥️ M5Stack Cardputer Advanced: Running Porkchop firmware by Octo as a standalone serial analysis terminal.
  • Spectrum Analysis & VHF/UHF Comms:
    • 📻 HackRF Portapack H4 & RTL-SDR: Making the invisible world visible. When the Flipper's CC1101 bottlenecks, escalate to external 1MHz-6GHz SDR arrays via physical SPI bridging.
    • 🎙️ Quansheng UV-K5: A highly capable, hackable handheld radio. The Flipper's GPIO serves as a programmable PTT interface to transmit encrypted digital APRS payloads.
  • 📡 ProjectZero & OWASP Intelligence: Integrated security logic and protocol manipulation derived from official Project Zero vulnerability mapping and the OWASP CheatSheet Series.
  • 🦆 Hak5 Tactical Payloads: Native translation of master payload repositories: USB Rubber Ducky, WiFi Pineapple, Bash Bunny, and OMG Cable.
  • 🛠️ Cyber-Analytic Arrays: Logic and conversion matrices sourced from CyberChef (GCHQ), SecLists, and Awesome-Hacking.
  • 🌍 Signal ISR (Intelligence, Surveillance, Reconnaissance): Direct integration of cellular tower and satellite tracking logic via Tower-Hunter and GNSS frameworks.

We operate closely mapped alongside heavily customized smartphones and physical tools: Nothing Phone 3 (Brute-force cloud processing), Civivi Elementum Button Lock (Physical override architecture), and the Zebra F-701 (Tactical scribing).


▓▒░ IV. INSTALLATION — SD CARD VIA qFlipper

The only supported install method is SD card content copy via the qFlipper SD Card tab. No firmware flashing is required or supported.

CyberFlipper v1.2.1 — Release 2026-04-20

What's New

  • Daily CVE BadUSB payloads (auto-generated from CISA KEV catalog)
  • Extra apps bundle updated
  • SD card only distribution — no OTA flash required

Included BadUSB CVE Payloads: See badusb/ for the full CVE payload listing.

LEGAL: All payloads are for authorized security research in controlled environments only. See LEGAL.md.

Steps

  1. Download CYBERFLIPPER-v1.2.1-SD_CARD.zip from the Releases page.
  2. Extract the zip — you will see: badusb/, infrared/, nfc/, subghz/, lfrfid/, dolphin/, apps/, u2f/
  3. Open qFlipper → connect Flipper via USB → click the SD Card tab.
  4. Drag and drop the extracted folders onto the SD card root.
  5. Eject and reboot your Flipper Zero.

What's Included

Folder Contents
badusb/ 88+ BadUSB payloads + daily CVE scripts (Windows/Linux/macOS)
infrared/ IR universal remote databases
nfc/ NFC dumps, Amiibo collection, hotel keys
subghz/ Gate codes, vehicle signals, brute-force sets
lfrfid/ EM4100, HID Prox, Indala RFID dumps
dolphin/ Dolphin XP level data
apps/ 35+ WiFi/RF, 14 Bluetooth, 9 SubGHz, Games, GPIO, NFC tools (.fap)
u2f/ U2F key assets

▓▒░ V. NATIVE SOFTWARE TOPOLOGY

  • PASSIVE_NODE Integrations: Background mapping software (wardriver.c). Natively formats 802.11 / NMEA frames to .csv for direct database sync without external parsing.
  • qFlipper SD Card Protocol: All content distributed as SD card data only. Copy via qFlipper SD Card tab — no firmware flash, no OTA update required.

▓▒░ VI. HARDWARE TECHNICAL SPECIFICATIONS

Full specifications reference: Official Flipper Zero Tech Specs | Hardware Schematics

📐 Body

Parameter Value
Materials PC, ABS, PMMA
Height 40.1 mm (1.58 inches)
Width 100.3 mm (3.95 inches)
Depth 25.6 mm (1.01 inches)
Weight 102 grams (3.6 ounces)

🖥️ Display

Parameter Value
Type Monochrome LCD
Resolution 128×64 pixels
Controller ST7567
Interface SPI
Diagonal 1.4"

⚙️ Microcontroller Unit (MCU)

Parameter Value
Model STM32WB55RG
Application Processor ARM Cortex-M4 32-bit @ 64 MHz
Radio Processor ARM Cortex-M0+ 32-bit @ 32 MHz
Radio Bluetooth LE 5.4, 802.15.4, Proprietary
Flash 1024 KB (shared between application & radio)
SRAM 256 KB (shared between application & radio)

📡 Sub-1 GHz Module

Parameter Value
Transceiver CC1101
TX Power -20 dBm max
Frequency Bands 315 MHz · 433 MHz · 868 MHz · 915 MHz (region-dependent)

📱 NFC (13.56 MHz)

Parameter Value
Transceiver ST25R3916
Frequency 13.56 MHz
Protocols ISO-14443A/B, NFC Forum
Supported Cards MIFARE Classic®, Ultralight®, DESFire®, FeliCa™, HID iClass (Picopass)

🔑 RFID 125 kHz

Parameter Value
Frequency 125 KHz
Modulation AM, OOK
Coding ASK, PSK
Supported Cards EM4100, HID H10301, Indala 26, IoProx XSF, AWID, FDX-A, FDX-B, Pyramid, Viking, Jablotron, Paradox, PAC Stanley, Keri, Gallagher, Nexwatch, Electra, Securakey

🔌 GPIO

Parameter Value
I/O Pins 13 available on external 2.54mm connectors
Logic Level 3.3V CMOS
Input Tolerance 5V tolerant (See AN4899)
Max Current Up to 20 mA per digital pin

🔴 Infrared

Parameter Value
RX Wavelength 950 nm (±100 nm)
RX Carrier 38 KHz (±5%)
TX Wavelength 940 nm
TX Carrier 0–2 MHz
TX Power 300 mW
Protocols NEC, Kaseikyo, RCA, RC5, RC6, Samsung, SIRC

🗝️ iButton 1-Wire

Parameter Value
Protocols Dallas DS199x, DS1971, CYFRAL, Metakom, TM2004, RW1990

🔋 Battery

Parameter Value
Type Lithium Polymer (LiPo)
Capacity 2100 mAh
Battery Life Up to 28 days
Operating Temp 0° to 40°C (32° to 104°F)

💾 MicroSD Card

Parameter Value
Max Capacity Up to 256 GB
Recommended 2–32 GB
Interface SPI
R/W Speed Up to 5 Mbps

🔗 USB

Parameter Value
Connector Type-C
Standard USB 2.0
Data Speed 12 Mbps
Max Charge 1 A

📶 Bluetooth LE 5.4

Parameter Value
TX Power 4 dBm max
RX Sensitivity -96 dBm
Data Rate 2 Mbps

🔊 Buzzer & Vibration

Parameter Value
Buzzer Frequency 100–2500 Hz
Sound Output 87 dB
Buzzer Type Coin
Vibration Force 30 N
Vibration Speed 13500 rpm

▓▒░ VII. EDC ECOSYSTEM

CYBERFLIPPER serves as the core bridging microcontroller representing the "Swiss Army Knife of cybersecurity tools" for an extensive Everyday Carry (EDC) loadout. We integrate directly with the greatest external penetration hardware on the market:

▓▒░ VIII. LAB401 PRODUCT CATALOG INTEGRATION

🛒 Live Lab401 Catalog

The CyberFlipper dashboard now features a fully integrated, live-updating product catalog from Lab401. This catalog is available at lab401.html and is updated daily via GitHub Actions. All product data is stored in assets/lab401_catalog.json and rendered dynamically for a seamless user experience.

Features:

Legal: All product data is sourced from Lab401 and is for informational and convenience purposes only. See Lab401 Terms for details. No commercial relationship is implied.


▓▒░ IX. BRANDING & ASSET PIPELINE

🎨 Custom Animation Standards

CYBERFLIPPER uses the F-SERIES bitmap specification. To create custom animations for the intelligence deck:

  1. Design: Use Aseprite or Photoshop for 128x64 pixel art.
  2. Compile: Convert PNG frames to .bm using asset_packer.py.
  3. Register: Add your animation to /dolphin/manifest.txt with a designated weight.

🔗 Contributor Uplink

Join the F-SERIES core on Discord for development blueprints: ➡️ https://discord.gg/Cd9qyvht7X


© 2026 FurulieLLC | Personfu | NEON_DUSK_PROTOCOL

▓▒░ X. APPENDIX: FLIPPER ANIMATION ARCHITECTURE

A technical guide for the CyberFlipper Neural Interface.

🛠️ SOFTWARE TOPOLOGY

Local Engineering:

  1. Aseprite (Primary)
  2. Adobe Photoshop (High Fidelity)
  3. GIMP / Microsoft Paint (Legacy)

Web-Link Arrays: EzGIF, Piskel, Lopaka, Photopea.

📂 FILE STRUCTURE PROTOCOLS

CFW (Custom Firmware) Standard:

Animation_Pack_Name/
    ├── Anims/
    │   ├── Animation_1/
    │   │   ├── frame_0.bm
    │   │   ├── frame_1.bm
    │   │   └── meta.txt
    │   └── manifest.txt
    └── Icons/
        └── Passport/
            └── passport_128x64.bmx

⚙️ COMPILATION VECTORS

Use compile_assets.py or official FBT logs to debug:

  • log debug: The optimal verbosity for signal analysis.
  • log trace: High-intensity telemetry (overwhelming).

For errors regarding 'frames order', verify the passive/active frame counts in your meta.txt against the .bm library.

About

Flipper Zero Custom Project

Resources

Code of conduct

Contributing

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages

  • HTML 40.1%
  • TypeScript 17.5%
  • JavaScript 13.4%
  • CSS 12.1%
  • Python 9.1%
  • C++ 4.7%
  • Other 3.1%