Skip to content

Latest commit

 

History

History
155 lines (90 loc) · 6.81 KB

File metadata and controls

155 lines (90 loc) · 6.81 KB

Frequently Asked Questions

General

What is PINGEQUA RF Lab?

PINGEQUA RF Lab is an open-source Flipper Application Package (FAP) that turns Flipper Zero plus the PINGEQUA 2-in-1 RF Devboard into a real-time 2.4 GHz spectrum analyzer with optional NRF24 jammer (v0.3.0+).

How is it different from existing NRF24 scanners?

Most existing NRF24 scanner apps were built for older single-chip add-on boards. They don't handle the dual-chip 2.4 GHz + Sub-GHz layout of modern expansion modules like the PINGEQUA 2-in-1, often resulting in failed scans, broken Sub-GHz access after exit, or firmware-specific tweaks needed.

PINGEQUA RF Lab was designed from the start for the 2-in-1 board's actual electrical layout. See the How It Compares table.

Is it free?

Yes — open source under MIT License. The source code, FAP binary, and documentation are all free. The hardware (PINGEQUA 2-in-1 board) is a separate purchase.

Is the hardware required?

For real-world use, yes. The app is officially supported only on the PINGEQUA 2-in-1 RF Devboard.

Installation & Setup

Which Flipper firmwares are supported?

Firmware Status
Momentum (mntm-dev) ✅ Primary target
Unleashed ✅ Compatible
RogueMaster ✅ Compatible
Official Flipper firmware ✅ Compatible (API ≥ 87.1)
Xtreme ✅ Compatible

How do I install?

Three options, easiest first:

  1. qFlipper drag-and-drop: Download the FAP from Releases, drag into /ext/apps/GPIO/ via qFlipper.
  2. ufbt sideload: ufbt launch from a clone of this repo.
  3. Manual: Copy dist/pingequa_rf_toolkit.fap to your microSD's apps/GPIO/ folder.

See Quickstart for step-by-step.

Usage

How do I read the bars?

Each vertical bar represents a 1 MHz wide channel between 2400 MHz and 2525 MHz. Bar height shows accumulated activity at that frequency. Higher bar = more detection.

See UI Guide for full details.

What's "max hold" mode?

When any bar reaches the top, the app auto-pauses the scan and freezes the display — the standard spectrum-analyzer convention. Captures the snapshot for analysis. Press OK to clear and rescan.

How do I find my home WiFi channel?

  1. Launch the app
  2. Wait 10–30 seconds with normal WiFi activity nearby
  3. Look for a tall bar near one of the ▲ markers (WiFi 1 / 6 / 11)
  4. Move cursor onto the tall bar → header shows the exact frequency

What's the difference between dwell and sweep rate?

  • Dwell = how long each channel is sampled (130–2000 µs, ↑/↓ to adjust)
  • Sweep rate = how many full 126-channel passes per second

Lower dwell → faster sweep but might miss brief signals. Higher dwell → slower sweep, catches weaker activity. Default 150 µs gives roughly 17 sweeps per second.

Can I export scan data?

Not in v0.3.0. CSV export is planned for v0.4.0 — see Roadmap.

Does the Jammer work on every channel?

Yes — CW (constant wave) mode allows targeting any channel 0–125 (2400–2525 MHz). Sweep mode hops through all 126 channels in chunks. Power is fixed at the NRF24L01+'s maximum +20 dBm in v0.3.0; configurable power UI is planned for v0.4.0.

Hardware

Which hardware is supported?

Officially: The PINGEQUA Flipper Zero NRF24+CC1101 2-in-1 RF Devboard.

⚠️ Other NRF24 boards: may partially work, but unsupported. The app's pin mapping assumes the PINGEQUA 2-in-1 layout.

Will it interfere with my Sub-GHz / NFC / Bad-USB apps?

No. The app cleans up all pins on exit. After you Back out, Flipper's stock apps (Sub-GHz Read, NFC Read, etc.) work normally.

If you observe interference, please file a bug — that's a regression we want to fix.

Legal & Safety

Is RF scanning legal?

Passive listening (which is what the scanner does) is generally unregulated worldwide. You're not transmitting, just observing — comparable to using a radio receiver.

Active transmission (the v0.3.0+ Jammer feature) requires opt-in user activation and is subject to local regulations:

  • US: FCC §15 / §333
  • EU: ETSI EN 300 328
  • Other regions: equivalent national authorities

You are responsible for compliance with your local laws. See SECURITY.md for full disclosure.

Can I use this for security research?

Yes, for authorized research on equipment you own or have permission to test. Common use cases:

  • Auditing your home WiFi for congestion / interference
  • Investigating an unknown 2.4 GHz emitter in your space
  • BLE device discovery / mapping
  • Educational demonstrations
  • Coexistence testing on equipment you own

Not a tool for unauthorized eavesdropping, network attack, or interfering with networks you don't own.

Development

Can I contribute?

Yes! See CONTRIBUTING.md for guidelines.

Can I fork and modify?

The MIT license permits commercial and private modification with attribution. Note: PINGEQUA® is a registered trademark — forks must use a different name.

How do I report a bug?

Use the bug report template. Include firmware, hardware, exact steps, and any error screen text.

How do I suggest a feature?

Use the feature request template. Check the Roadmap first — your idea may already be planned.

Brand & Support

Who makes the PINGEQUA boards?

PINGEQUA is a hardware brand specializing in expansion modules for Flipper Zero, M5Cardputer, and M5Stick. Tagline: "Precision Gear for Hackers".

Where do I buy the board?

Official store with worldwide shipping (195+ countries): 🛒 pingequa.com

Where can I get support?


Question not answered here? Open a discussion or email support@pingequa.com.