The Jtagulator is a professional hardware debugging tool used to help identify common on-board debug and serial interfaces during authorised hardware analysis and reverse engineering.
It is particularly useful when working with undocumented or unfamiliar PCBs where interface discovery would otherwise be slow and error-prone. In a lab setting, it can help narrow down candidate pins for JTAG, SWD, and UART-style communications before deeper analysis begins.
This makes it a practical addition to embedded security, board bring-up, and hardware assessment workflows that rely on reproducible interface mapping and integration with standard debugging tools.
Key Features
Helps identify common debug and serial interfaces
Useful for embedded security and reverse-engineering labs
24-channel platform with protected inputs
Adjustable target I/O level support
Integrates with OpenOCD and sigrok workflows
Safety Note
Incorrect probing can damage target hardware. Verify voltage domains, ground reference, and authorised scope before attaching to a board under test.
Reverse Engineering Notice
Some Hackitsune products may be capable of interacting with, analysing, or modifying electronic systems, firmware, and communication protocols for research, development, repair, interoperability testing, and authorised security analysis. Laws relating to reverse engineering and firmware analysis vary between jurisdictions and may be subject to copyright, anti-circumvention, telecommunications, or computer misuse legislation. Users are responsible for ensuring all use complies with applicable laws and is performed only on systems they own or have explicit permission to test.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
NRF24 Mouse & Keyboard Module for Flipper Zero
Slip this little rascal onto your Flipper and watch "air-gapped" illusions wobble. Built for curious defenders, cheeky pen-testers, and anyone who enjoys proving problems exist before they become disasters.
This compact nRF24 module gives your Flipper Zero the muscles to scan for, emulate, and interact with nRF24-based wireless HID dongles, the RF technology wireless keyboards and mice often use. It’s great for lab demos, vulnerability audits, and classroom show-and-tell where you want to turn “maybe vulnerable” into “definitely fixed.” Supported by most Flipper firmwares — we recommend Momentum for the smoothest ride.
Keyboard & Mouse Jacking
Some older wireless keyboards/mice and their tiny USB dongles trust RF traffic they really shouldn’t. When links accept unauthenticated or poorly authenticated packets, attackers can inject keystrokes or mouse actions remotely. That’s keyboard jacking / mouse jacking: scary-sounding, but exactly the kind of thing you should only test for in a controlled, authorised environment. This module helps you demonstrate the risk so you can fix it.
Compatibility & firmware
Works with most Flipper Zero firmware branches.
Momentum firmware recommended. Check your firmware docs for specific nRF24 HID features.
What’s in the box
nRF24 RF module (Flipper-compatible form factor.
This module can be plugged into the flipper zero, or DIY ESP/ Arduino project using breadboard / jumper cables. We recommend using a flipper adaptor for ease of use.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
Padlock shims are consumable bypass tools used to defeat spring-latch padlocks by inserting the shim alongside the shackle and rotating it to depress the locking latch. Their thin profile allows them to slip into many common padlock designs where tolerances permit.
Application
A practical addition to any physical testing kit, shims are intended for controlled access work, training, and security research where non-destructive entry techniques are required.
Key Features
Useful for evaluating susceptible padlock designs
Supports authorised training and assessment
Compact and easy to carry in field kits
Suitable for locksmiths and physical security practitioners
Helps demonstrate the importance of improved lock selection
Safety Note
Use only on locks you own or are explicitly authorised to assess. Not all padlocks are susceptible, and destructive force should be avoided.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
This is a pack of 5 thin flexible sheets intended for authorised locksmith work, latch evaluation, and physical security training.
These tools are typically used to assess whether door tolerances and latch designs permit simple bypass pressure in situations where non-destructive testing is authorised and appropriate.
For professional users, insert sheets are useful for demonstrating door hardware weaknesses and validating whether mitigations such as guards, strike improvements, or latch redesign are necessary.
Product Specification Table
Set Size
5 pieces
Tool Type
Thin insert / bypass sheets
Use Case
Authorised latch evaluation and training
Material
Flexible sheet construction
Key Features
Useful for latch vulnerability assessment
Supports locksmith training and demonstration work
Non-destructive tool class for compatible scenarios
Multiple sheets for different gap and latch profiles
Compact and easy to carry in field kits
Easily cut to custom shape to suit requirements.
Safety Note
These tools are intended for professional locksmithing and authorised physical security testing only. Avoid damage to doors, weather seals, and frame components during use.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The PROXGRIND RF Field Detector is a compact diagnostic tool used to identify and measure the presence of radio frequency fields generated by proximity card readers and other RF-based access control systems.
Security researchers and access control technicians often use RF detectors to quickly determine the operating frequency of an RFID or proximity reader before performing compatibility testing or hardware evaluation. The device detects RF emissions and provides a visual or audible indication of signal presence.
This makes it a useful tool during access control system surveys, reader installations, and authorised security assessments involving RFID infrastructure.
DisclaimerHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.
Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
The SOP8/SOP16 IC Programmer Testing Clip is a practical accessory for in-circuit access to supported flash, EEPROM, and related IC packages for diagnostics, programming, and firmware extraction.
It allows technicians and hardware researchers to attach to compatible devices without immediate desoldering, making it well suited to lab analysis, board recovery, and firmware maintenance tasks where temporary access is preferred.
This style of clamp is commonly used with external programmers and bench tools (JTAGULATOR, Bus Pirate, ESP bus pirate, etc) during flashing, and reverse-engineering work.
Supported packages
These push down probes are designed for specific chip package sizes. Select the right cable form the options when orgering that suits your purpose.
These packages are most commonly used for flash.
Key Features
Supports multiple common IC package formats
Useful for temporary in-circuit access
Suitable for repair, analysis, and firmware maintenance
Reduces need for immediate chip removal
Helpful for bench and lab diagnostics
Safety Note
Always verify chip orientation, pinout, and programmer voltage before attaching the clamp. In-circuit programming on live or unsupported boards may cause damage.
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊
Description
The Ultimate Magic Card Gen 4 is a configurable RFID research card intended for authorised NFC and access-control testing in lab and assessment environments.
It is designed for professionals who need a flexible card-format platform for tag emulation, compatibility checks, and controlled credential behaviour testing across common 13.56 MHz workflows.
This type of card is commonly used during access-control research, reader validation, and protocol experimentation where a portable and reconfigurable test tag is preferable to disposable single-purpose media.
Product Specification Table
Operating Band
13.56 MHz
Use Case
RFID / NFC research and tag emulation
Compatibility
Flipper Zero, Proxmark/iCopy-class tools.
Compatible Card types
MIFARE Mini
MIFARE 1k S50 4 byte UID
MIFARE 1k S50 7 byte UID
MIFARE 1k S50 10 byte UID
MIFARE 4k S70 4 byte UID
MIFARE 4k S70 7 byte UID
MIFARE 4k S70 10 byte UID
Ultralight
Ultralight-C
Ultralight Ev1
NTAG
Card Configuration parameters
Preset Card Type
UID
UID Length (4-byte / 7-byte / 10-byte)
SAK (1 byte)
ATQA (2 bytes)
ATS (Custom length / Disable)
Disclaimer
Hackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.Hackitsune accepts no liability for misuse of this product. Use responsibly. 🦊