The 2.54mm Pogo Pin PCB Clip Clamp Fixture is a bench accessory for creating temporary electrical contact with 2.54mm pitch pads or headers during programming, test, and validation work.
It is useful when a researcher or developer needs repeatable access to a PCB without soldering permanent leads, especially during firmware loading, diagnostics, fixture-based production checks, or board recovery workflows.
Gold-plated pogo contacts and multi-pin options make this style of fixture practical for development labs, repair benches, and small-scale manufacturing support.
Application
Used to create temporary non-solder contact with compatible PCB pads or headers for programming, diagnostics, and bench validation.
How to Use
Identify the compatible test points or pad spacing on the authorised target board.
Select the correct probe count and align the fixture with the contact points.
Apply consistent pressure to establish contact during programming or testing.
Remove the fixture after validation or firmware operations are complete.
Product Specification Table
Pin Pitch
2.54 mm
Probe Options
3P to 10P variants
Contact Type
Gold-plated pogo pins
Use Case
Temporary programming and PCB test access
Key Features
Temporary non-solder contact for development workflows
Useful for programming, diagnostics, and validation
Available in multiple pin-count options
Suitable for lab, repair, and production bench use
Gold-plated contacts for repeatable probing
Safety Note
Improper alignment may short adjacent contacts or damage pads. Confirm spacing, polarity, and voltage before applying the fixture.
Disclaimer
Some HacKitsune products may be capable of interacting with, analysing, or modifying electronic systems, firmware, and communication protocols for research, development, repair, interoperability testing, and authorised security analysis. Laws relating to reverse engineering and firmware analysis vary between jurisdictions and may be subject to copyright, anti-circumvention, telecommunications, or computer misuse legislation. Users are responsible for ensuring all use complies with applicable laws and is performed only on systems they own or have explicit permission to test.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
These compact Antennas measure up at 3cm in length, useful in senarios where you dont want large antennas sticking out.
Despite the size these antennas provide pack 3dBi signal strnegth into a 3cm package.
Specifications
433MHz (Frequency): Optimized for devices operating in the UHF band, commonly used for garage door openers, telemetry, IoT sensors, and remote controls.
3dBi (Gain): Amplifies the signal by 3 decibels relative to an isotropic radiator (dBi). This increases range compared to a lower gain antenna.
Rubber Antenna (Type): Frequently called a "rubber duck" antenna; flexible, durable, and encased in rubber for indoor/general-purpose use.
SMA Male (Connector): Screws directly onto devices with an SMA Female connector (fits Hackitsune 433Mhz Flipper Module and the 400Mhz side of the dual frequency (400-900mhz) flipper module).
3cm (Length): Indicates the physical length, making it ideal for compact applications where space is limited, though efficiency can sometimes be lower than longer alternatives.
AVX 9176 Series Hex Punch-Down Tool — Precision in Every Punch
The AVX 1/4" Hex Punch-Down Tool is your go-to companion for clean, consistent wire seating on the ESPKey’s Insulation Displacement Connectors (IDCs). Designed as a non-cutting, precision punch-down bit, it fits any standard 1/4" hex driver handle — manual or powered.
Unlike generic bits or improvised tools, this purpose-built punch-down ensures firm, reliable wire termination without tearing insulation or deforming the connector. Every push seats the conductor perfectly into the IDC blades, guaranteeing a secure electrical connection and professional-grade finish.
If you’re installing or reworking ESPKey modules, this is the tool that keeps your workflow clean, repeatable, and damage-free. One bit, perfect punches, every time.
The CH751 Key is a widely used utility key designed to operate CH751 cam locks commonly found on electrical cabinets, utility panels, server racks, and access enclosures. These locks are frequently used in low-security applications where quick service access is required.
Security professionals, facility managers, and authorised technicians often encounter CH751 locks during infrastructure audits, maintenance tasks, and security assessments. Having a CH751 key allows legitimate operators to quickly access compatible enclosures without damaging the lock hardware.
Because CH751 locks are widely deployed across industrial and commercial environments, this key is commonly included in toolkits for authorised facility servicing and security testing.
Safety NoteKeys should only be used on locks you are authorised to operate.
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Leather Bag Case for Chameleon Ultra is a compact leather case designed to protect your Camelion Ultra from wear and tear and scratches. Also useful for covering the device & lights for covert use in the field.
(Chameleon Ultra not included)
The Chameleon Ultra is an advanced RFID research platform designed for analysing, emulating, and interacting with RFID and NFC systems. It is widely used by security researchers, hardware developers, and access control specialists to study contactless credential technologies.
The device supports a wide range of RFID protocols and allows researchers to emulate tags, analyse communication, and test system behaviour within controlled environments. Its portable design and powerful firmware make it a versatile tool for authorised RFID security assessments and hardware development.
The platform is commonly used for research involving access control systems, NFC devices, and RFID infrastructure testing..
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Dangerfield Praxis Locksmith Tool Kit is a professional lock picking set intended for mechanical lock work, skills development, and controlled physical security assessment.
Popular with locksmiths, trainers, and assessment teams who need a portable range of hand tools for lock handling, manipulation practice, and evaluation of mechanical weaknesses in scope-approved environments.
This selection of precision lock picks are a professional accessory for legitimate lock service, training labs, authorised physical security engagements, and hobbyists.
The pack includes the following picks in TWO gauges: 0.023" and 0.015"
Short Hook
Medium Hook
Deforest Diamond
Half Diamond
3 Peak B-Rake Pick
S-Rake
City Rake
W Rake
Tension Tools:
Dangerfield Z-Wrench
Long Twist Wrench
Short Standard Wrench
Top of Keyway wrench 0.030" (0.76mm)
Top of Keyway wrench 0.050" (1.27mm)
Disclaimer
These tools are intended for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with physical locks, systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Door Jim Pry Bar is a non-destructive entry tool designed to assist with opening doors equipped with spring latch mechanisms. It is commonly used by locksmiths, emergency responders, and security professionals to bypass simple latch systems without damaging door hardware.
The tool slides between the door frame and latch assembly, allowing the user to manipulate the spring latch and release the door. This approach is frequently used during authorised lockout situations where rapid access is required.
Its slim profile and durable construction make it a useful addition to professional physical security and locksmith toolkits.
Safety NoteThese tools are intended for professional locksmithing and authorised physical security testing only.
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The ESP32 WROVER Programming Tool is a practical bench accessory for flashing, testing, and iterating on WROVER-class ESP32 modules during embedded development.
It is intended for engineers and researchers who want a stable programming workflow for module-level bring-up, firmware validation, and rapid test cycles before integrating hardware into larger systems.
Typical use cases include firmware development, peripheral validation, communications testing, and controlled prototype evaluation using standard ESP32 software ecosystems.
Technical Requirements
Requires a compatible host computer and the usual ESP32 development toolchain such as esptool, ESP-IDF, Arduino, or PlatformIO.
Best suited to controlled development environments using supported WROVER-class modules and 3.3V logic.
To use first install the CP2104 serial chip driver for your system.
Press the module into the coppr clips. (ESP32 module not included)
Power on and connect to your PC via usb cable.
Configure the com port of your ESP32 flasher/ serial software of choice.
Product Specifications
Supported Modules
ESP32 WROVER-class modules
Programming Interface
UART / serial flashing workflow
Logic Voltage
3.3V environment
Use Case
Development, programming, and test validation
Compatibility
ESP-IDF, Arduino, PlatformIO, custom ESP32 firmware
Safety Note
Improper connections may damage connected hardware. Confirm voltage levels, module fitment, and programming pin mapping before use.
The Hackitsune ESPKey Wiegand Interception & Replay Module is a compact, inline hardware platform designed for professional access control testing, diagnostics, and research.
Designed to sit transparently between a reader and controller, ESPKey operates on standard 5V Wiegand signalling, making it compatible with a wide range of access control systems including card readers, keypads, fobs, and many biometric devices that output Wiegand downstream.
Featuring a punchdown cable interface to allow you to tap into exposed cables coming from a range of card readers, once installed, the module can capture credential bitstreams in transit, store them in onboard non-volatile memory (up to ~80,000 records depending on format), and replay them via its built-in Wi-Fi web interface.
Small enough to fit behind most readers, yet powerful enough to demonstrate real-world access control weaknesses, ESPKey is a practical tool for authorised red team engagements, system validation, and security training.
This module is based on the original open-source hardware and firmware by OctoSavvi, with updates to the design to make it easier to flash (via pins on the back of the ESPKey using a compatible FTDI serial adaptor or similar.) Boot and Reset buttons have been added to make the flash process easier, we recommend using a pin clamp or pin clip to avoid having to solder contacts to the pcb.
In the spirit of Open Source updated Hackitsune PCB designs and build files available github
Small enough to fit behind most readers, powerful enough to demonstrate real-world vulnerabilities.
Technical Requirements
• Compatible access control system using 5V Wiegand interface• Inline installation between reader and controller• Wi-Fi capable device (laptop/mobile) for interface access
Installation Overview
• Connect between reader and panel using Wiegand lines (D0, D1, GND, VCC)• Power via standard 5V Wiegand supply• Device operates transparently once installed
Firmware
Pre-installed:
• Latest ESPKey firmware (shipped ready to use)
Firmware Updates
Firmware can be installed or updated using the Hackitsune Web Flasher (supported browsers only):
https://www.hackitsune.com/pages/hackitsune-web-flasher
Post-Flash Storage Setup (Important)
After flashing ESPKey firmware, you must initialise the onboard storage:
Connect your laptop to the ESPKey Wi-Fi access point(SSID format: ESPKEY-*)
Download and run the storage setup script locally:ui-update.sh
This process prepares the filesystem for credential storage
Note:If this step is skipped, credential logging and storage functionality will not operate correctly.
How to Use
Install ESPKey inline between the reader and controller
Power the system using standard Wiegand supply
Connect to the ESPKey Wi-Fi access point
Access the web interface via browser
Capture, store, and replay credential data as required
Important Usage Notes
• Designed for 5V Wiegand systems only• Ensure correct wiring before installation• Some biometric systems output alternative protocols — verify compatibility• Storage must be initialised after firmware flashing• Device operates passively unless actively used
Preventative Measures to Mitigate Risk of Use
• Only use on systems you are authorised to test• Avoid deployment on production systems without approval• Ensure safe handling of captured credential data• Follow responsible disclosure practices• Comply with local laws regarding access control testing
Product Specifications
Specification
Details
Interface
Wiegand (D0/D1)
Voltage
5V
Connectivity
Wi-Fi (web interface)
Storage
~80,000 credentials (format dependent)
Operation Mode
Inline interception and replay
Firmware
ESPKey (pre-installed)
Open Source Base
OctoSavvi ESPKey
Hardware Files
GitHub
Form Factor
Compact inline module
Use Case
Access control testing and diagnostics
Key Features
• Inline Wiegand interception and replay module• Compatible with 5V access control systems• Captures and stores credential bitstreams• Built-in Wi-Fi web interface for control• Stores up to ~80,000 credentials• Based on open-source OctoSavvi ESPKey platform• Hackitsune-enhanced PCB design and build files available• Firmware updatable via Hackitsune Web Flasher
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune ESPKey is a compact, inline Wiegand interception and replay module built for professional access control testing and diagnostics.
Designed to sit transparently between a reader and panel, ESPKey works with systems using standard 5V Wiegand signalling including card, fob, keypad, and many biometric readers that output Wiegand downstream. Once installed, it can log credential bitstreams in transit, store them in non-volatile memory (up to ~80,000 depending on format), and replay them in via its built-in Wi-Fi web interface.
Small enough to fit behind most readers, powerful enough to demonstrate real-world vulnerabilities.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
A compact Flipper Zero add-on that pairs an ESP32-S3 with an onboard GPS and a microSD slot purpose built for Marauder firmware, with the flexibility to flash with custom firmware of your choice. Use your Flipper’s own screen and controls to navigate menus, run scans, and log results.
All boards are pre-flashed with latest ESP Merauder firmware, use the HacKitsune Web Flasher to update or change firmware.
Note that due to Australian and international regulations affecting devices that have exposed Lithium Cell batteries, the GPS backup battery holder has been removed from these boards. This does not affect general operation, however getting the first GPS fix may take a little longer.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune SPI and Serial Adapter Module is engineered to extend the functionality of your Flipper Zero while protecting its most critical component: the SD card. By leveraging the Flipper’s dedicated 5V GPIO rail (enabled via GPIO settings), this module provides a clean, stable power supply and GPIO connectivity to external SPI and Serial peripherals without loading the 3.3V rail that services the SD card.
Why does this matter? Many external modules draw inconsistent current or introduce electrical noise that can destabilize the 3V rail, risking SD corruption or unexpected resets. The PowerBridge isolates and stabilizes power delivery, ensuring your expansions run clean while your core system remains protected.
Designed for Expansion
This adapter acts as a reliable foundation for a growing ecosystem of 3rd party and Hackitsune-compatible modules, including:
NRF24 (2.4GHz) boards – for wireless research applications
433MHz & 915MHz RF modules – extended sub-GHz experimentation
GPS satellite modules – wardriving and geospatial testing
Additional SPI & UART-based modules will be added as the ecosystem expands
This module is designed for Hackitsune modules, and can support a range of 3rd party modules available online. Always check the pin configuration of modules before connecting to this adaptor and your flipper as incorrect pin/ power connections can damage modules!
Whether you're building out a portable RF toolkit or developing custom GPIO integrations, the PowerBridge ensures your setup remains stable under load.
The Hackitsune 400MHz RF Expansion Module for Flipper Zero is a high-performance Sub-GHz add-on designed to extend the transmission range, signal stability, and overall RF capability of your device.
Built around the E07-400M10S RF module, this expansion provides enhanced performance across the 400 MHz Sub-GHz band, enabling stronger and more reliable signal interaction compared to the internal Flipper radio. This makes it particularly useful for RF research, protocol testing, and signal analysis in environments where increased range or signal clarity is required.
The module is designed to integrate with the Hackitsune SPI & Serial Adapter Module, providing a clean and stable interface to the Flipper Zero while maintaining flexibility for use in other DIY projects. Its compact form factor and external antenna support ensure optimal performance in field and lab environments.
Technical Requirements
Flipper Zero (not included)
Hackitsune SPI & Serial Adapter Module (required for Flipper use, sold separately)
Compatible Sub-GHz firmware or applications
External antenna connected before operation
Frequency Coverage
Based on the E07-400M10S module, typical supported frequency range is approximately 410 MHz – 525 MHz, depending on configuration and firmware.
How to Use
Connect the module to the SPI & Serial Adapter (sold separately)
Attach the assembly to the Flipper Zero GPIO. (ensure the GPIO 5V power is enabled)
Connect a compatible antenna.
Launch Sub-GHz applications on the Flipper.
Important Usage Notes
Always connect an antenna before transmitting
Operating without an antenna may damage the RF module
Ensure correct frequency configuration before transmission, this module works best at 410 MHz – 525 MHz, pushing beyond these frequencies can damage the module
Key Features
High-power 400 MHz RF expansion module
Based on E07-400M10S (C1101) transceiver
Extends range and signal reliability vs onboard radio
Designed for SPI & Serial Adapter integration
External antenna support for optimal performance
Compact and modular design
Suitable for authorised RF research
Disclaimer
Devices capable of transmitting radio signals must be used in accordance with local radio spectrum regulations. Ensure appropriate licensing and operate only in authorised testing environments.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune Dual-Band RF Expansion Module for Flipper Zero (400MHz + 900MHz) is a high-performance GPIO add-on designed to significantly extend the Sub-GHz capabilities of the Flipper Zero.
This module integrates two dedicated RF transceiver paths covering the ~300–950 MHz spectrum, enabling improved reception sensitivity, stable signal transmission and extended operational range. The dual-module design allows researchers to work across both lower Sub-GHz bands (~300–500 MHz) and higher bands (~800–950 MHz), selectable via an onboard hardware switch.
This external module provides a safe interface for extended frequency experimentation, reducing the risk of stressing your flippers onboard components.
Technical Requirements
Flipper Zero (not included)
External antenna (connected before operation)
Compatible Sub-GHz firmware (standard or custom - we recommend momentum firmware)
5V GPIO power enabled in Flipper settings (required)
Why 5V Power is Required
We designed the bord to maximise stability and provide an low noise, filtered power supply with;
Stable power delivery for RF transmission bursts
Reduced electrical noise improving RF performance
Prevention of voltage dips during transmission
Using the 3.3V rail may result in SD card instability or corruption due to voltage sag, RF signal degradation and reduced range, and unreliable module behaviour under load.
How to Use
Attach the module to the Flipper Zero GPIO header.
Connect a compatible antenna to the selected RF module.
Enable 5V GPIO power in Flipper settings.
Select the desired frequency band using the onboard switch.
Operate using Sub-GHz applications on the Flipper.
Important Usage Notes
Always connect an antenna before transmitting (Operating without an antenna can damage RF components)
Switch frequency bands only when the device is idle.
Use appropriate antennas for the selected frequency band and module.
Key Features
Dual-band RF expansion (400 MHz + 900 MHz)
Extends Flipper coverage across ~300–950 MHz
Improved range and signal reception
Hardware switch for band selection
Designed for stable 5V GPIO operation
Disclaimer
Devices capable of transmitting radio signals must be used in accordance with local radio spectrum regulations. Ensure appropriate licensing and operate only in authorised testing environments.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
Description
Hackitsune ESP-Bus-Pirate is a customised ESP32-S3 development board designed around breakout access and bench-friendly connectivity for ESP32 Bus Pirate-style firmware workflows.
It is intended for researchers and hardware developers who want a compact multi-protocol tool for digital bus interaction, serial terminal use, and rapid prototyping without building a one-off fixture for each target.
With multiple exposed breakouts and a firmware ecosystem inspired by the Bus Pirate concept, the board is well suited to I2C, SPI, UART, 1-Wire, GPIO, JTAG and other supported lab workflows in controlled environments.
Technical Requirements
Requires a host workstation for USB serial or web-based access and a supported firmware build for the ESP32-S3 platform.
Best suited for lab setups where researchers need flexible wiring access, repeatable bench connections, and quick mode switching across supported protocols.
Firmware
Designed for the ESP32 Bus Pirate / TSP-Bus-Pirate style firmware ecosystem, which provides interactive serial and web-based CLI workflows for multiple protocol modes.
Firmware compatibility depends on the final board pin mapping and the currently supported ESP32-S3 targets in the selected firmware project.
How to Use
Connect the board to the host system and wire the required breakout points to the authorised target hardware.
Install a supported ESP32-S3 firmware build appropriate for the intended protocol workflow.
Open the serial or web interface and select the required bus mode.
Capture responses, validate signalling, or automate bench tasks in a controlled environment.
Product Specification Table
Processor Platform
ESP32-S3
Primary Use
Multi-protocol hardware research and bench interaction
Interfaces
USB plus breakout access for supported bus modes
Firmware Ecosystem
ESP32 Bus Pirate / TSP-Bus-Pirate style firmware
Typical Protocols
I2C, SPI, UART, 1-Wire, GPIO and other supported modes
Key Features
Custom ESP32-S3 board tailored for bench work
Breakout-friendly design for rapid protocol access
Suitable for Bus Pirate-style firmware workflows
Useful for prototyping, validation, and hardware research
Supports interactive multi-protocol testing in controlled environments
Safety Note
Improper wiring can damage target hardware or the board itself. Always verify voltage domains, pin mapping, and authorised scope before connection.
Reverse Engineering Notice
Some Hackitsune products may be capable of interacting with, analysing, or modifying electronic systems, firmware, and communication protocols for research, development, repair, interoperability testing, and authorised security analysis. Laws relating to reverse engineering and firmware analysis vary between jurisdictions and may be subject to copyright, anti-circumvention, telecommunications, or computer misuse legislation. Users are responsible for ensuring all use complies with applicable laws and is performed only on systems they own or have explicit permission to test.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The ESP32 WROOM Programming Tool is a practical bench accessory for flashing, testing, and iterating on WROOM-class ESP32 modules during embedded development.
It is intended for engineers and researchers who want a stable programming workflow for module-level bring-up, firmware validation, and rapid test cycles before integrating hardware into larger systems.
Typical use cases include firmware development, peripheral validation, communications testing, and controlled prototype evaluation using standard ESP32 software ecosystems.
Technical Requirements
Requires a compatible host computer and the usual ESP32 development toolchain such as esptool, ESP-IDF, Arduino, or PlatformIO.
Best suited to controlled development environments using supported WROVER-class modules and 3.3V logic.
To use first install the CP2104 serial chip driver for your system.
Press the module into the coppr clips. (ESP32 module not included)
Power on and connect to your PC via usb cable.
Configure the com port of your ESP32 flasher/ serial software of choice.
Product Specifications
Supported Modules
ESP32 WROOM-class modules
Programming Interface
UART / serial flashing workflow
Logic Voltage
3.3V environment
Use Case
Development, programming, and test validation
Compatibility
ESP-IDF, Arduino, PlatformIO, custom ESP32 firmware
Safety Note
Improper connections may damage connected hardware. Confirm voltage levels, module fitment, and programming pin mapping before use.
The Hackitsune GhostBlaster is a portable multi-radio research platform built for wireless exploration, device interaction, and field analysis.
Powered by dual ESP modules (ESP32-S3 + ESP32-C5) and running GhostESP firmware, GhostBlaster combines Wi-Fi, Bluetooth, GPS, infrared, Ethernet, and SD card logging into a single handheld device with a full colour touchscreen.
Capture wireless environments, interact with devices, log data, and experiment with protocols — all from a self-contained portable toolkit.
Key Features
Dual ESP architecture – ESP32-S3 + ESP32-C5
2.4 GHz + 5 GHz Wi-Fi support
Bluetooth / BLE scanning and discovery
Integrated GPS for wardriving and geolocation logging
Infrared transmit and receive for IR capture and replay
Ethernet networking support
MicroSD card slot for PCAP captures and data logging
Rechargeable lithium battery powered operation
Full colour touchscreen interface
Portable handheld form factor
USB interface for firmware updates and development
GhostBlaster runs GhostESP, an open-source firmware platform designed for wireless experimentation and device interaction.
GhostBlaster is designed to be a self-contained wireless research platform.built specifically to support the GhostESP revival firmware.
Devices are pre flashed with the latest GhostESP firmware, latest compatable firmwares are avaialble for online update via the HacKitsune web flasher.
The integrated touchscreen interface, rechargeable battery, and SD card storage allow researchers to capture and analyse wireless environments without needing a laptop.
From wardriving and wireless discovery to signal interaction and protocol experimentation, GhostBlaster brings a full research toolkit into a compact handheld device.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune GhostESP Flipper Module is an ESP32 S3 based companion board designed for Flipper-style GPIO integration and GhostESP or
ESPMerauder firmware
It provides a compact hardware platform for teams who want a dedicated ESP32 module for lab experimentation, firmware development, and controlled Wi-Fi or BLE analysis without building a custom board from scratch.
For Hackitsune customers, it is best positioned as a configurable research module for authorised wireless testing, prototyping, and toolchain development in the GhostESP ecosystem or other compatible ESP32 projects.
Technical Requirements
Flipper Zero (not included), with supporting firmware installed, we recommend Momentum firmware.
GhostESP firmware (use the Hackitsune web flasher to upgrade to latest version)
Key Features
ESP32 S3 board for Flipper-style workflows
Designed for GhostESP (and ESPMerauder) firmware use
Suitable for wireless & Ethernet research and prototyping
Useful for controlled Wi-Fi and BLE analysis tasks
Supports custom ESP32 development paths
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune GPS Module for Flipper Zero is a compact serial-based positioning module designed to provide location data for compatible Flipper applications and external development platforms.
This module is intended to be used in conjunction with the Hackitsune SPI & Serial Adapter Module (sold separately), enabling support for GPS-enabled applications on the Flipper Zero. It outputs standard serial NMEA data, making it equally suitable for standalone use in ESP32, Arduino, and other embedded development projects.
The module includes an onboard battery holder to support warm start functionality, allowing it to retain satellite data between uses and significantly reduce the time required to acquire a GPS fix. (Battery not included.)
Technical Requirements
Flipper Zero with SPI & Serial Adapter Module
Compatible GPS-enabled Flipper applications
External projects: ESP32, Arduino, or other serial-capable platforms
Important Integration Notes
This module outputs serial (UART) data only
It cannot be connected directly to the Flipper Zero GPIO
Requires a SPI & Serial Adapter Module for Flipper compatibility
GPS Fix Behaviour
Depending on your location and environment, acquiring a GPS signal may take time. Initial cold start may take several minutes. At the Hackitsune office, this typically takes a few minutes, and in some locations acquisition time may be significantly longer.
For best results, position the module facing upwards toward open sky and avoid indoor or obstructed environments.
Warm Start Support
The onboard battery holder allows the module to retain satellite data between uses
Faster acquisition on subsequent power cycles
Improved reliability in repeated use scenarios
Requires a compatible backup battery (not included)
Note: This module provides GPS data only and does not support wardriving functionality. For wardriving use cases, a module with an integrated ESP32 running firmware such as ESPMarauder or GhostESP is required.
How to Use
Connect the module to a SPI & Serial Adapter (for Flipper use).
Attach to the Flipper Zero GPIO.
Power on and launch a compatible GPS application.
Allow time for satellite acquisition.
Use location data within supported applications.
Preventative Measures to Mitigate Risk of Use
Use only in authorised environments when collecting location data
Avoid reliance on GPS in safety-critical applications
Ensure proper antenna orientation for reliable operation
Follow local regulations regarding location tracking and data usage
Product Specification Table
Key Features
Serial GPS module for Flipper Zero and DIY projects
Works with SPI & Serial Adapter for Flipper integration
Onboard battery support for warm start
Compatible with ESP32 and Arduino projects
Outputs standard NMEA GPS data
Disclaimer
This device receives satellite signals and provides location data. Use responsibly and in accordance with local laws regarding tracking and data collection.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune High-Power IR Blaster Module for Flipper Zero is a GPIO expansion designed to significantly extend the infrared transmission capabilities of your device.
While the Flipper Zero includes a built-in IR transmitter, its range and output power are limited for longer-distance IR applications. This module overcomes those limitations by integrating 15 high-power IR LEDs, delivering a dramatically stronger and more focused infrared signal. The result is improved range, better signal penetration and performance in real-world environments.
Housed in a sleek form factor that mounts cleanly to the top of your Flipper Zero, this module is ideal for IR research, signal testing, and universal remote functionality. (Flipper Zero not included.)
Technical Requirements
Flipper Zero (not included)
5V GPIO power must be enabled
Depending on your firmware the IR app may detect the external IT module and automatically enable 5v (this has ben tested and works on Momentum firmware)
Why 5V Power is Required
This module is designed to operate from the Flipper’s 5V GPIO rail to support the current demands of multiple high-power IR LEDs.
Sufficient current to drive 15 high-power IR LEDs (the flipper zero 5v rail supports up to 1A)
Stable output for consistent IR transmission
Improved signal strength and range
We designed the board to avoid using the flipper's 3.3V rail as this may result in insufficient power output, voltage instability under load, and SD card data corruption.
How to Use
Attach the module to the Flipper Zero GPIO header.
Enable 5V GPIO power in Flipper settings.
Select or load an IR signal via the Flipper interface.
Transmit using the IR application.
Disclaimer
Devices capable of emitting infrared signals should be used responsibly and only on systems where you have explicit authorisation.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The J Tool for Thumb Turn Locks is a specialised physical security accessory intended for authorised lockout response, facilities work, and controlled physical security assessments.
Its profile is designed for environments where a researcher, locksmith, or facilities professional needs a non-destructive method to reach and manipulate compatible thumb-turn hardware without dismantling the door assembly.
This type of tool is typically used during access control reviews, emergency lockout support, and authorised red team exercises focused on mechanical weaknesses in door hardware.
Application
Inserted under door or between door for authorised lockout response and physical security testing on compatible internal thumb-turn lock hardware.
Product Specification Table
Tool Type
Thumb-turn manipulation tool
Use Case
Authorised lockout and security assessment work
Construction
Hand tool for field carry
Compatibility
Selected thumb-turn lock setups
Safety Note
Always ensure that there is sufficient tolerance to use the tool without causing damage to door or fixtures.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
Description
The Under Door Tool is a professional physical security accessory used to reach and manipulate compatible interior door handles from beneath a door.
It is commonly carried by locksmiths, facilities teams, and physical security assessors as a quick, a non-destructive option for opening doors.
In assessment work, under-door tools help document whether door clearances and interior hardware placement create exposure that should be mitigated.
Key Features
Designed for compatible under-door access
Supports non-destructive physical security evaluation
Suitable for locksmith and facilities toolkits
Helps identify real-world door hardware exposure
Safety Note
These tools are intended for professional locksmithing, facilities support, and authorised physical security testing only.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊