The 2.54mm Pogo Pin PCB Clip Clamp Fixture is a bench accessory for creating temporary electrical contact with 2.54mm pitch pads or headers during programming, test, and validation work.
It is useful when a researcher or developer needs repeatable access to a PCB without soldering permanent leads, especially during firmware loading, diagnostics, fixture-based production checks, or board recovery workflows.
Gold-plated pogo contacts and multi-pin options make this style of fixture practical for development labs, repair benches, and small-scale manufacturing support.
Application
Used to create temporary non-solder contact with compatible PCB pads or headers for programming, diagnostics, and bench validation.
How to Use
Identify the compatible test points or pad spacing on the authorised target board.
Select the correct probe count and align the fixture with the contact points.
Apply consistent pressure to establish contact during programming or testing.
Remove the fixture after validation or firmware operations are complete.
Product Specification Table
Pin Pitch
2.54 mm
Probe Options
3P to 10P variants
Contact Type
Gold-plated pogo pins
Use Case
Temporary programming and PCB test access
Key Features
Temporary non-solder contact for development workflows
Useful for programming, diagnostics, and validation
Available in multiple pin-count options
Suitable for lab, repair, and production bench use
Gold-plated contacts for repeatable probing
Safety Note
Improper alignment may short adjacent contacts or damage pads. Confirm spacing, polarity, and voltage before applying the fixture.
Disclaimer
Some HacKitsune products may be capable of interacting with, analysing, or modifying electronic systems, firmware, and communication protocols for research, development, repair, interoperability testing, and authorised security analysis. Laws relating to reverse engineering and firmware analysis vary between jurisdictions and may be subject to copyright, anti-circumvention, telecommunications, or computer misuse legislation. Users are responsible for ensuring all use complies with applicable laws and is performed only on systems they own or have explicit permission to test.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
These compact Antennas measure up at 3cm in length, useful in senarios where you dont want large antennas sticking out.
Despite the size these antennas provide pack 3dBi signal strnegth into a 3cm package.
Specifications
433MHz (Frequency): Optimized for devices operating in the UHF band, commonly used for garage door openers, telemetry, IoT sensors, and remote controls.
3dBi (Gain): Amplifies the signal by 3 decibels relative to an isotropic radiator (dBi). This increases range compared to a lower gain antenna.
Rubber Antenna (Type): Frequently called a "rubber duck" antenna; flexible, durable, and encased in rubber for indoor/general-purpose use.
SMA Male (Connector): Screws directly onto devices with an SMA Female connector (fits Hackitsune 433Mhz Flipper Module and the 400Mhz side of the dual frequency (400-900mhz) flipper module).
3cm (Length): Indicates the physical length, making it ideal for compact applications where space is limited, though efficiency can sometimes be lower than longer alternatives.
AVX 9176 Series Hex Punch-Down Tool — Precision in Every Punch
The AVX 1/4" Hex Punch-Down Tool is your go-to companion for clean, consistent wire seating on the ESPKey’s Insulation Displacement Connectors (IDCs). Designed as a non-cutting, precision punch-down bit, it fits any standard 1/4" hex driver handle — manual or powered.
Unlike generic bits or improvised tools, this purpose-built punch-down ensures firm, reliable wire termination without tearing insulation or deforming the connector. Every push seats the conductor perfectly into the IDC blades, guaranteeing a secure electrical connection and professional-grade finish.
If you’re installing or reworking ESPKey modules, this is the tool that keeps your workflow clean, repeatable, and damage-free. One bit, perfect punches, every time.
The CH751 Key is a widely used utility key designed to operate CH751 cam locks commonly found on electrical cabinets, utility panels, server racks, and access enclosures. These locks are frequently used in low-security applications where quick service access is required.
Security professionals, facility managers, and authorised technicians often encounter CH751 locks during infrastructure audits, maintenance tasks, and security assessments. Having a CH751 key allows legitimate operators to quickly access compatible enclosures without damaging the lock hardware.
Because CH751 locks are widely deployed across industrial and commercial environments, this key is commonly included in toolkits for authorised facility servicing and security testing.
Safety NoteKeys should only be used on locks you are authorised to operate.
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Leather Bag Case for Chameleon Ultra is a compact leather case designed to protect your Camelion Ultra from wear and tear and scratches. Also useful for covering the device & lights for covert use in the field.
(Chameleon Ultra not included)
The Chameleon Ultra is an advanced RFID research platform designed for analysing, emulating, and interacting with RFID and NFC systems. It is widely used by security researchers, hardware developers, and access control specialists to study contactless credential technologies.
The device supports a wide range of RFID protocols and allows researchers to emulate tags, analyse communication, and test system behaviour within controlled environments. Its portable design and powerful firmware make it a versatile tool for authorised RFID security assessments and hardware development.
The platform is commonly used for research involving access control systems, NFC devices, and RFID infrastructure testing..
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Door Jim Pry Bar is a non-destructive entry tool designed to assist with opening doors equipped with spring latch mechanisms. It is commonly used by locksmiths, emergency responders, and security professionals to bypass simple latch systems without damaging door hardware.
The tool slides between the door frame and latch assembly, allowing the user to manipulate the spring latch and release the door. This approach is frequently used during authorised lockout situations where rapid access is required.
Its slim profile and durable construction make it a useful addition to professional physical security and locksmith toolkits.
Safety NoteThese tools are intended for professional locksmithing and authorised physical security testing only.
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The ESP32 WROVER Programming Tool is a practical bench accessory for flashing, testing, and iterating on WROVER-class ESP32 modules during embedded development.
It is intended for engineers and researchers who want a stable programming workflow for module-level bring-up, firmware validation, and rapid test cycles before integrating hardware into larger systems.
Typical use cases include firmware development, peripheral validation, communications testing, and controlled prototype evaluation using standard ESP32 software ecosystems.
Technical Requirements
Requires a compatible host computer and the usual ESP32 development toolchain such as esptool, ESP-IDF, Arduino, or PlatformIO.
Best suited to controlled development environments using supported WROVER-class modules and 3.3V logic.
To use first install the CP2104 serial chip driver for your system.
Press the module into the coppr clips. (ESP32 module not included)
Power on and connect to your PC via usb cable.
Configure the com port of your ESP32 flasher/ serial software of choice.
Product Specifications
Supported Modules
ESP32 WROVER-class modules
Programming Interface
UART / serial flashing workflow
Logic Voltage
3.3V environment
Use Case
Development, programming, and test validation
Compatibility
ESP-IDF, Arduino, PlatformIO, custom ESP32 firmware
Safety Note
Improper connections may damage connected hardware. Confirm voltage levels, module fitment, and programming pin mapping before use.
The Hackitsune ESPKey Wiegand Interception & Replay Module is a compact, inline hardware platform designed for professional access control testing, diagnostics, and research.
Designed to sit transparently between a reader and controller, ESPKey operates on standard 5V Wiegand signalling, making it compatible with a wide range of access control systems including card readers, keypads, fobs, and many biometric devices that output Wiegand downstream.
Featuring a punchdown cable interface to allow you to tap into exposed cables coming from a range of card readers, once installed, the module can capture credential bitstreams in transit, store them in onboard non-volatile memory (up to ~80,000 records depending on format), and replay them via its built-in Wi-Fi web interface.
Small enough to fit behind most readers, yet powerful enough to demonstrate real-world access control weaknesses, ESPKey is a practical tool for authorised red team engagements, system validation, and security training.
This module is based on the original open-source hardware and firmware by OctoSavvi, with updates to the design to make it easier to flash (via pins on the back of the ESPKey using a compatible FTDI serial adaptor or similar.) Boot and Reset buttons have been added to make the flash process easier, we recommend using a pin clamp or pin clip to avoid having to solder contacts to the pcb.
In the spirit of Open Source updated Hackitsune PCB designs and build files available github
Small enough to fit behind most readers, powerful enough to demonstrate real-world vulnerabilities.
Technical Requirements
• Compatible access control system using 5V Wiegand interface• Inline installation between reader and controller• Wi-Fi capable device (laptop/mobile) for interface access
Installation Overview
• Connect between reader and panel using Wiegand lines (D0, D1, GND, VCC)• Power via standard 5V Wiegand supply• Device operates transparently once installed
Firmware
Pre-installed:
• Latest ESPKey firmware (shipped ready to use)
Firmware Updates
Firmware can be installed or updated using the Hackitsune Web Flasher (supported browsers only):
https://www.hackitsune.com/pages/hackitsune-web-flasher
Post-Flash Storage Setup (Important)
After flashing ESPKey firmware, you must initialise the onboard storage:
Connect your laptop to the ESPKey Wi-Fi access point(SSID format: ESPKEY-*)
Download and run the storage setup script locally:ui-update.sh
This process prepares the filesystem for credential storage
Note:If this step is skipped, credential logging and storage functionality will not operate correctly.
How to Use
Install ESPKey inline between the reader and controller
Power the system using standard Wiegand supply
Connect to the ESPKey Wi-Fi access point
Access the web interface via browser
Capture, store, and replay credential data as required
Important Usage Notes
• Designed for 5V Wiegand systems only• Ensure correct wiring before installation• Some biometric systems output alternative protocols — verify compatibility• Storage must be initialised after firmware flashing• Device operates passively unless actively used
Preventative Measures to Mitigate Risk of Use
• Only use on systems you are authorised to test• Avoid deployment on production systems without approval• Ensure safe handling of captured credential data• Follow responsible disclosure practices• Comply with local laws regarding access control testing
Product Specifications
Specification
Details
Interface
Wiegand (D0/D1)
Voltage
5V
Connectivity
Wi-Fi (web interface)
Storage
~80,000 credentials (format dependent)
Operation Mode
Inline interception and replay
Firmware
ESPKey (pre-installed)
Open Source Base
OctoSavvi ESPKey
Hardware Files
GitHub
Form Factor
Compact inline module
Use Case
Access control testing and diagnostics
Key Features
• Inline Wiegand interception and replay module• Compatible with 5V access control systems• Captures and stores credential bitstreams• Built-in Wi-Fi web interface for control• Stores up to ~80,000 credentials• Based on open-source OctoSavvi ESPKey platform• Hackitsune-enhanced PCB design and build files available• Firmware updatable via Hackitsune Web Flasher
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune ESPKey is a compact, inline Wiegand interception and replay module built for professional access control testing and diagnostics.
Designed to sit transparently between a reader and panel, ESPKey works with systems using standard 5V Wiegand signalling including card, fob, keypad, and many biometric readers that output Wiegand downstream. Once installed, it can log credential bitstreams in transit, store them in non-volatile memory (up to ~80,000 depending on format), and replay them in via its built-in Wi-Fi web interface.
Small enough to fit behind most readers, powerful enough to demonstrate real-world vulnerabilities.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
A compact Flipper Zero add-on that pairs an ESP32-S3 with an onboard GPS and a microSD slot purpose built for Marauder firmware, with the flexibility to flash with custom firmware of your choice. Use your Flipper’s own screen and controls to navigate menus, run scans, and log results.
All boards are pre-flashed with latest ESP Merauder firmware, use the HacKitsune Web Flasher to update or change firmware.
Note that due to Australian and international regulations affecting devices that have exposed Lithium Cell batteries, the GPS backup battery holder has been removed from these boards. This does not affect general operation, however getting the first GPS fix may take a little longer.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune SPI and Serial Adapter Module is engineered to extend the functionality of your Flipper Zero while protecting its most critical component: the SD card. By leveraging the Flipper’s dedicated 5V GPIO rail (enabled via GPIO settings), this module provides a clean, stable power supply and GPIO connectivity to external SPI and Serial peripherals without loading the 3.3V rail that services the SD card.
Why does this matter? Many external modules draw inconsistent current or introduce electrical noise that can destabilize the 3V rail, risking SD corruption or unexpected resets. The PowerBridge isolates and stabilizes power delivery, ensuring your expansions run clean while your core system remains protected.
Designed for Expansion
This adapter acts as a reliable foundation for a growing ecosystem of 3rd party and Hackitsune-compatible modules, including:
NRF24 (2.4GHz) boards – for wireless research applications
433MHz & 915MHz RF modules – extended sub-GHz experimentation
GPS satellite modules – wardriving and geospatial testing
Additional SPI & UART-based modules will be added as the ecosystem expands
This module is designed for Hackitsune modules, and can support a range of 3rd party modules available online. Always check the pin configuration of modules before connecting to this adaptor and your flipper as incorrect pin/ power connections can damage modules!
Whether you're building out a portable RF toolkit or developing custom GPIO integrations, the PowerBridge ensures your setup remains stable under load.
The Hackitsune 400MHz RF Expansion Module for Flipper Zero is a high-performance Sub-GHz add-on designed to extend the transmission range, signal stability, and overall RF capability of your device.
Built around the E07-400M10S RF module, this expansion provides enhanced performance across the 400 MHz Sub-GHz band, enabling stronger and more reliable signal interaction compared to the internal Flipper radio. This makes it particularly useful for RF research, protocol testing, and signal analysis in environments where increased range or signal clarity is required.
The module is designed to integrate with the Hackitsune SPI & Serial Adapter Module, providing a clean and stable interface to the Flipper Zero while maintaining flexibility for use in other DIY projects. Its compact form factor and external antenna support ensure optimal performance in field and lab environments.
Technical Requirements
Flipper Zero (not included)
Hackitsune SPI & Serial Adapter Module (required for Flipper use, sold separately)
Compatible Sub-GHz firmware or applications
External antenna connected before operation
Frequency Coverage
Based on the E07-400M10S module, typical supported frequency range is approximately 410 MHz – 525 MHz, depending on configuration and firmware.
How to Use
Connect the module to the SPI & Serial Adapter (sold separately)
Attach the assembly to the Flipper Zero GPIO. (ensure the GPIO 5V power is enabled)
Connect a compatible antenna.
Launch Sub-GHz applications on the Flipper.
Important Usage Notes
Always connect an antenna before transmitting
Operating without an antenna may damage the RF module
Ensure correct frequency configuration before transmission, this module works best at 410 MHz – 525 MHz, pushing beyond these frequencies can damage the module
Key Features
High-power 400 MHz RF expansion module
Based on E07-400M10S (C1101) transceiver
Extends range and signal reliability vs onboard radio
Designed for SPI & Serial Adapter integration
External antenna support for optimal performance
Compact and modular design
Suitable for authorised RF research
Disclaimer
Devices capable of transmitting radio signals must be used in accordance with local radio spectrum regulations. Ensure appropriate licensing and operate only in authorised testing environments.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune Dual-Band RF Expansion Module for Flipper Zero (400MHz + 900MHz) is a high-performance GPIO add-on designed to significantly extend the Sub-GHz capabilities of the Flipper Zero.
This module integrates two dedicated RF transceiver paths covering the ~300–950 MHz spectrum, enabling improved reception sensitivity, stable signal transmission and extended operational range. The dual-module design allows researchers to work across both lower Sub-GHz bands (~300–500 MHz) and higher bands (~800–950 MHz), selectable via an onboard hardware switch.
This external module provides a safe interface for extended frequency experimentation, reducing the risk of stressing your flippers onboard components.
Technical Requirements
Flipper Zero (not included)
External antenna (connected before operation)
Compatible Sub-GHz firmware (standard or custom - we recommend momentum firmware)
5V GPIO power enabled in Flipper settings (required)
Why 5V Power is Required
We designed the bord to maximise stability and provide an low noise, filtered power supply with;
Stable power delivery for RF transmission bursts
Reduced electrical noise improving RF performance
Prevention of voltage dips during transmission
Using the 3.3V rail may result in SD card instability or corruption due to voltage sag, RF signal degradation and reduced range, and unreliable module behaviour under load.
How to Use
Attach the module to the Flipper Zero GPIO header.
Connect a compatible antenna to the selected RF module.
Enable 5V GPIO power in Flipper settings.
Select the desired frequency band using the onboard switch.
Operate using Sub-GHz applications on the Flipper.
Important Usage Notes
Always connect an antenna before transmitting (Operating without an antenna can damage RF components)
Switch frequency bands only when the device is idle.
Use appropriate antennas for the selected frequency band and module.
Key Features
Dual-band RF expansion (400 MHz + 900 MHz)
Extends Flipper coverage across ~300–950 MHz
Improved range and signal reception
Hardware switch for band selection
Designed for stable 5V GPIO operation
Disclaimer
Devices capable of transmitting radio signals must be used in accordance with local radio spectrum regulations. Ensure appropriate licensing and operate only in authorised testing environments.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The ESP32 WROOM Programming Tool is a practical bench accessory for flashing, testing, and iterating on WROOM-class ESP32 modules during embedded development.
It is intended for engineers and researchers who want a stable programming workflow for module-level bring-up, firmware validation, and rapid test cycles before integrating hardware into larger systems.
Typical use cases include firmware development, peripheral validation, communications testing, and controlled prototype evaluation using standard ESP32 software ecosystems.
Technical Requirements
Requires a compatible host computer and the usual ESP32 development toolchain such as esptool, ESP-IDF, Arduino, or PlatformIO.
Best suited to controlled development environments using supported WROVER-class modules and 3.3V logic.
To use first install the CP2104 serial chip driver for your system.
Press the module into the coppr clips. (ESP32 module not included)
Power on and connect to your PC via usb cable.
Configure the com port of your ESP32 flasher/ serial software of choice.
Product Specifications
Supported Modules
ESP32 WROOM-class modules
Programming Interface
UART / serial flashing workflow
Logic Voltage
3.3V environment
Use Case
Development, programming, and test validation
Compatibility
ESP-IDF, Arduino, PlatformIO, custom ESP32 firmware
Safety Note
Improper connections may damage connected hardware. Confirm voltage levels, module fitment, and programming pin mapping before use.
The Hackitsune GPS Module for Flipper Zero is a compact serial-based positioning module designed to provide location data for compatible Flipper applications and external development platforms.
This module is intended to be used in conjunction with the Hackitsune SPI & Serial Adapter Module (sold separately), enabling support for GPS-enabled applications on the Flipper Zero. It outputs standard serial NMEA data, making it equally suitable for standalone use in ESP32, Arduino, and other embedded development projects.
The module includes an onboard battery holder to support warm start functionality, allowing it to retain satellite data between uses and significantly reduce the time required to acquire a GPS fix. (Battery not included.)
Technical Requirements
Flipper Zero with SPI & Serial Adapter Module
Compatible GPS-enabled Flipper applications
External projects: ESP32, Arduino, or other serial-capable platforms
Important Integration Notes
This module outputs serial (UART) data only
It cannot be connected directly to the Flipper Zero GPIO
Requires a SPI & Serial Adapter Module for Flipper compatibility
GPS Fix Behaviour
Depending on your location and environment, acquiring a GPS signal may take time. Initial cold start may take several minutes. At the Hackitsune office, this typically takes a few minutes, and in some locations acquisition time may be significantly longer.
For best results, position the module facing upwards toward open sky and avoid indoor or obstructed environments.
Warm Start Support
The onboard battery holder allows the module to retain satellite data between uses
Faster acquisition on subsequent power cycles
Improved reliability in repeated use scenarios
Requires a compatible backup battery (not included)
Note: This module provides GPS data only and does not support wardriving functionality. For wardriving use cases, a module with an integrated ESP32 running firmware such as ESPMarauder or GhostESP is required.
How to Use
Connect the module to a SPI & Serial Adapter (for Flipper use).
Attach to the Flipper Zero GPIO.
Power on and launch a compatible GPS application.
Allow time for satellite acquisition.
Use location data within supported applications.
Preventative Measures to Mitigate Risk of Use
Use only in authorised environments when collecting location data
Avoid reliance on GPS in safety-critical applications
Ensure proper antenna orientation for reliable operation
Follow local regulations regarding location tracking and data usage
Product Specification Table
Key Features
Serial GPS module for Flipper Zero and DIY projects
Works with SPI & Serial Adapter for Flipper integration
Onboard battery support for warm start
Compatible with ESP32 and Arduino projects
Outputs standard NMEA GPS data
Disclaimer
This device receives satellite signals and provides location data. Use responsibly and in accordance with local laws regarding tracking and data collection.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Hackitsune High-Power IR Blaster Module for Flipper Zero is a GPIO expansion designed to significantly extend the infrared transmission capabilities of your device.
While the Flipper Zero includes a built-in IR transmitter, its range and output power are limited for longer-distance IR applications. This module overcomes those limitations by integrating 15 high-power IR LEDs, delivering a dramatically stronger and more focused infrared signal. The result is improved range, better signal penetration and performance in real-world environments.
Housed in a sleek form factor that mounts cleanly to the top of your Flipper Zero, this module is ideal for IR research, signal testing, and universal remote functionality. (Flipper Zero not included.)
Technical Requirements
Flipper Zero (not included)
5V GPIO power must be enabled
Depending on your firmware the IR app may detect the external IT module and automatically enable 5v (this has ben tested and works on Momentum firmware)
Why 5V Power is Required
This module is designed to operate from the Flipper’s 5V GPIO rail to support the current demands of multiple high-power IR LEDs.
Sufficient current to drive 15 high-power IR LEDs (the flipper zero 5v rail supports up to 1A)
Stable output for consistent IR transmission
Improved signal strength and range
We designed the board to avoid using the flipper's 3.3V rail as this may result in insufficient power output, voltage instability under load, and SD card data corruption.
How to Use
Attach the module to the Flipper Zero GPIO header.
Enable 5V GPIO power in Flipper settings.
Select or load an IR signal via the Flipper interface.
Transmit using the IR application.
Disclaimer
Devices capable of emitting infrared signals should be used responsibly and only on systems where you have explicit authorisation.
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The J Tool for Thumb Turn Locks is a specialised physical security accessory intended for authorised lockout response, facilities work, and controlled physical security assessments.
Its profile is designed for environments where a researcher, locksmith, or facilities professional needs a non-destructive method to reach and manipulate compatible thumb-turn hardware without dismantling the door assembly.
This type of tool is typically used during access control reviews, emergency lockout support, and authorised red team exercises focused on mechanical weaknesses in door hardware.
Application
Inserted under door or between door for authorised lockout response and physical security testing on compatible internal thumb-turn lock hardware.
Product Specification Table
Tool Type
Thumb-turn manipulation tool
Use Case
Authorised lockout and security assessment work
Construction
Hand tool for field carry
Compatibility
Selected thumb-turn lock setups
Safety Note
Always ensure that there is sufficient tolerance to use the tool without causing damage to door or fixtures.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
Description
The Under Door Tool is a professional physical security accessory used to reach and manipulate compatible interior door handles from beneath a door.
It is commonly carried by locksmiths, facilities teams, and physical security assessors as a quick, a non-destructive option for opening doors.
In assessment work, under-door tools help document whether door clearances and interior hardware placement create exposure that should be mitigated.
Key Features
Designed for compatible under-door access
Supports non-destructive physical security evaluation
Suitable for locksmith and facilities toolkits
Helps identify real-world door hardware exposure
Safety Note
These tools are intended for professional locksmithing, facilities support, and authorised physical security testing only.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The Jtagulator is a professional hardware debugging tool used to help identify common on-board debug and serial interfaces during authorised hardware analysis and reverse engineering.
It is particularly useful when working with undocumented or unfamiliar PCBs where interface discovery would otherwise be slow and error-prone. In a lab setting, it can help narrow down candidate pins for JTAG, SWD, and UART-style communications before deeper analysis begins.
This makes it a practical addition to embedded security, board bring-up, and hardware assessment workflows that rely on reproducible interface mapping and integration with standard debugging tools.
Key Features
Helps identify common debug and serial interfaces
Useful for embedded security and reverse-engineering labs
24-channel platform with protected inputs
Adjustable target I/O level support
Integrates with OpenOCD and sigrok workflows
Safety Note
Incorrect probing can damage target hardware. Verify voltage domains, ground reference, and authorised scope before attaching to a board under test.
Reverse Engineering Notice
Some Hackitsune products may be capable of interacting with, analysing, or modifying electronic systems, firmware, and communication protocols for research, development, repair, interoperability testing, and authorised security analysis. Laws relating to reverse engineering and firmware analysis vary between jurisdictions and may be subject to copyright, anti-circumvention, telecommunications, or computer misuse legislation. Users are responsible for ensuring all use complies with applicable laws and is performed only on systems they own or have explicit permission to test.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
NRF24 Mouse & Keyboard Module for Flipper Zero
Slip this little rascal onto your Flipper and watch "air-gapped" illusions wobble. Built for curious defenders, cheeky pen-testers, and anyone who enjoys proving problems exist before they become disasters.
This compact nRF24 module gives your Flipper Zero the muscles to scan for, emulate, and interact with nRF24-based wireless HID dongles, the RF technology wireless keyboards and mice often use. It’s great for lab demos, vulnerability audits, and classroom show-and-tell where you want to turn “maybe vulnerable” into “definitely fixed.” Supported by most Flipper firmwares — we recommend Momentum for the smoothest ride.
Keyboard & Mouse Jacking
Some older wireless keyboards/mice and their tiny USB dongles trust RF traffic they really shouldn’t. When links accept unauthenticated or poorly authenticated packets, attackers can inject keystrokes or mouse actions remotely. That’s keyboard jacking / mouse jacking: scary-sounding, but exactly the kind of thing you should only test for in a controlled, authorised environment. This module helps you demonstrate the risk so you can fix it.
Compatibility & firmware
Works with most Flipper Zero firmware branches.
Momentum firmware recommended. Check your firmware docs for specific nRF24 HID features.
What’s in the box
nRF24 RF module (Flipper-compatible form factor.
This module can be plugged into the flipper zero, or DIY ESP/ Arduino project using breadboard / jumper cables. We recommend using a flipper adaptor for ease of use.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
Padlock shims are consumable bypass tools used to defeat spring-latch padlocks by inserting the shim alongside the shackle and rotating it to depress the locking latch. Their thin profile allows them to slip into many common padlock designs where tolerances permit.
Application
A practical addition to any physical testing kit, shims are intended for controlled access work, training, and security research where non-destructive entry techniques are required.
Key Features
Useful for evaluating susceptible padlock designs
Supports authorised training and assessment
Compact and easy to carry in field kits
Suitable for locksmiths and physical security practitioners
Helps demonstrate the importance of improved lock selection
Safety Note
Use only on locks you own or are explicitly authorised to assess. Not all padlocks are susceptible, and destructive force should be avoided.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
This is a pack of 5 thin flexible sheets intended for authorised locksmith work, latch evaluation, and physical security training.
These tools are typically used to assess whether door tolerances and latch designs permit simple bypass pressure in situations where non-destructive testing is authorised and appropriate.
For professional users, insert sheets are useful for demonstrating door hardware weaknesses and validating whether mitigations such as guards, strike improvements, or latch redesign are necessary.
Product Specification Table
Set Size
5 pieces
Tool Type
Thin insert / bypass sheets
Use Case
Authorised latch evaluation and training
Material
Flexible sheet construction
Key Features
Useful for latch vulnerability assessment
Supports locksmith training and demonstration work
Non-destructive tool class for compatible scenarios
Multiple sheets for different gap and latch profiles
Compact and easy to carry in field kits
Easily cut to custom shape to suit requirements.
Safety Note
These tools are intended for professional locksmithing and authorised physical security testing only. Avoid damage to doors, weather seals, and frame components during use.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The PROXGRIND RF Field Detector is a compact diagnostic tool used to identify and measure the presence of radio frequency fields generated by proximity card readers and other RF-based access control systems.
Security researchers and access control technicians often use RF detectors to quickly determine the operating frequency of an RFID or proximity reader before performing compatibility testing or hardware evaluation. The device detects RF emissions and provides a visual or audible indication of signal presence.
This makes it a useful tool during access control system surveys, reader installations, and authorised security assessments involving RFID infrastructure.
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊