{"id":57739,"date":"2024-11-22T17:34:00","date_gmt":"2024-11-22T17:34:00","guid":{"rendered":"http:\/\/ad79dfb5-0569-4d71-a848-3274e6eb00e8"},"modified":"2024-11-22T17:34:00","modified_gmt":"2024-11-22T17:34:00","slug":"one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/","title":{"rendered":"One year later: 7 useful things the Flipper Zero can do that still blows my mind"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3c054ffc94ee2f96b055be8159976525551f38a0\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=768\" alt=\"Flipper Zero reading an NFC security key\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f384cb3b4b743bd0d7ccfb168d537ec5c677eb68\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1024\" alt=\"Flipper Zero reading an NFC security key\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280\" alt=\"Flipper Zero reading an NFC security key\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280\" alt=\"Flipper Zero reading an NFC security key\" width=\"1280\" height=\"720\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Flipper Zero reading an NFC security key.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET<\/span><\/figcaption><\/figure>\n<p>After over a year of use, I love my Flipper Zero, and I&#8217;m still finding cool things to do with it.<\/p>\n<p>Am I using it to steal cars, clone credit cards, or change the prices shown on gas station displays? Of course not! That&#8217;s just fake trash people upload to TikTok to try to look cool, and you can&#8217;t do anything like that.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/home-and-office\/best-black-friday-deals-2024\/\">The 50+ best Black Friday deals 2024: Early sales live now<\/a><\/strong><\/p>\n<p>But that doesn&#8217;t mean the Flipper Zero can&#8217;t do some very cool and useful things. Over the past year, I&#8217;ve been exploring the suite of tools built into the Flipper Zero, as well as extending its capabilities by installing custom firmware. It&#8217;s been a game-changer in so many ways!&nbsp;<\/p>\n<p>The Flipper Zero might be small, but there&#8217;s a lot of hardware packed into a small space.<\/p>\n<p>To begin with, there&#8217;s a sub-GHz wireless antenna that can capture and transmit wireless codes to operate wireless devices and access control systems, such as garage door remotes, boom barriers, IoT sensors, and even remote keyless systems.&nbsp;<\/p>\n<p>RFID support allows it to read, store, and emulate a number of different RFID cards.<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/do-rfid-blocking-cards-actually-work-my-flipper-zero-revealed-the-truth\/\"><strong>Do RFID blocking cards actually work? My Flipper Zero revealed the truth<\/strong><\/a><\/p>\n<p>It can also read, write, store, and emulate NFC tags. On the front, there&#8217;s a 1-Wire connector that can read and emulate iButton (aka DS1990A, CYFRAL, Touch Memory, or Dallas key) contact keys.<\/p>\n<p><!----><\/p>\n<p>There&#8217;s also a built-in infrared transceiver that can both capture and transmit IR codes to control things like TVs. Finally, on the top, there are GPIO connectors that allow the Flipper Zero to connect to other gadgets in the real world.<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-to-unlock-the-flipper-zero-true-power\/\"><strong>How to unlock the Flipper Zero&#8217;s true power<\/strong><\/a><\/p>\n<p>That&#8217;s a lot of features crammed into a tiny $169 device. But every week, I hear from buyers who are frustrated and disappointed because their Flipper Zero won&#8217;t do the things that it can seemingly do based on fake social media videos.<\/p>\n<p>Here are some of the things I&#8217;ve been doing with my Flipper Zero over the past few weeks.<\/p>\n<p><strong>Note<\/strong>: I&#8217;m usually running&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-to-unlock-the-flipper-zero-true-power\/#link={\">third-party software on my Flipper Zero<\/a>, which gives me access to a bunch of additional features. But worry not\u2014loading third-party software doesn&#8217;t invalidate your warranty, and you can easily go back to the stock software at any time using the Flipper Zero app on a desktop, laptop, or mobile device.<\/p>\n<div id=\"df78e6a6-cf08-4210-9cbd-3a8d5548b772\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"13.680104712042\">\n<div class=\"c-ShortcodeContent\" readability=\"46.229319371728\">\n<p>The sub-GHz wireless antenna can pick up signals from devices such as wireless doorbells and car key fobs, making the Flipper Zero a handy tool for testing if wireless transmitters are working properly. I use mine to test if the fobs are working and to test their range.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\"><strong>The best security keys you can buy (and how they work)<\/strong><\/a>&nbsp;<\/p>\n<p>And yes, the Flipper Zero can record the codes transmitted by car key fobs, but retransmitting these codes to a modern car won&#8217;t unlock it due to a feature called &#8216;rolling codes&#8217; that changes the code with each use. On older cars &#8212; those 20 years old and more &#8212; you could use a code captured to unlock the vehicle (but don&#8217;t do that unless it&#8217;s your car or you have permission!), but you still couldn&#8217;t drive away with it.<\/p>\n<p>On the flip side &#8212; pun intended &#8212; retransmitting the codes to a wireless doorbell will cause the bell to ring, as most of these systems don&#8217;t have a mechanism to protect against such annoyances.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"b9e30cff-c108-4dac-838f-86abe2ca1591\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"16.126104023553\">\n<div class=\"c-ShortcodeContent\" readability=\"50.682041216879\">\n<p>NFC is everywhere nowadays, and the Flipper Zero allows you to work with this wireless protocol. It&#8217;s built into plastic cards and fobs and used for all sorts of things, from unlocking hotel room doors to controlling barriers.<\/p>\n<p>But this doesn&#8217;t mean you can cause chaos in the world, because to unlock things you more often than not need access to the NFC key.&nbsp;<\/p>\n<p>NFC signals can be read by the Flipper Zero, and many NFC cards can also be <a href=\"https:\/\/www.youtube.com\/watch?v=ZpUqQsiwULk\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">copied and cloned<\/a> (this depends on the security used for the card, so I can&#8217;t give you any hard and fast rules about which NFC devices can be cloned). I&#8217;ve used my Flipper Zero to copy my hotel room card on occasion when the hotel only gives you a single card or when we have multiple rooms and don&#8217;t want to juggle a handful of cards.<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\"><strong>The best VPN services (and how to choose the right one for you)<\/strong><\/a><\/p>\n<p>However, note that while the Flipper Zero can read NFC cards and fobs, it cannot decode the card&#8217;s encrypted security code used on credit and debit cards, so they can&#8217;t be cloned.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do\/\" alt=\"Flipper Zero cannot decode the card's encrypted security code so it cannot clone bank cards\" width=\"1280\" height=\"720\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6.5\">\n<div class=\"c-ShortcodeContent\" readability=\"33\">\n<p>Flipper Zero cannot decode the card&#8217;s encrypted security code, so it cannot clone bank cards.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET<\/span><\/figcaption><\/figure>\n<div id=\"e28f271e-650a-40cb-a8be-98ddab286693\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10.677796327212\">\n<div class=\"c-ShortcodeContent\" readability=\"39.151919866444\">\n<p>Along with NFC, the Flipper Zero can read and clone RFID cards and fobs, including hotel cards as shown in the picture above.<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-retailer-is-using-rfid-tags-to-make-in-person-clothes-shopping-less-frustrating\/\"><strong>How RFID tags can make in-person clothes shopping less frustrating<\/strong><\/a><\/p>\n<p>RFID cards and tags can be locked to prevent them from being overwritten or having their security keys extracted, but the Flipper Zero can bypass many of these mechanisms. For example, it can offer to unlock the card if you present it to a valid reader (such as the lock it has been programmed to open). This allows you to clone the card and unlock the door using both the card and the Flipper Zero.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"bf72a74f-7b37-428e-bda9-0dfcf8c6cd52\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"11.938144329897\">\n<div class=\"c-ShortcodeContent\" readability=\"43.773195876289\">\n<p>The Flipper Zero has a built-in infrared module that can be programmed to operate a wide range of devices, from <a href=\"https:\/\/www.zdnet.com\/home-and-office\/home-entertainment\/best-tv\/\">TVs<\/a> to AC units.&nbsp;<\/p>\n<p>Pretty much any consumer device with an IR remote control interface can be controlled using the Flipper Zero.<\/p>\n<p>Another cool use of this functionality is to test if infrared remote controls are working. Simply point the remote control at the Flipper Zero in &#8216;read IR&#8217; mode, and it will detect the signals.<\/p>\n<p>I use this feature all the time to test remote controls that I&#8217;ve fixed after battery leaks have damaged the device. It&#8217;s an incredibly handy feature!<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"ae924844-ed51-4006-9e66-448121b9ada3\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10.5\">\n<div class=\"c-ShortcodeContent\" readability=\"41\">\n<p>Yes, the Flipper Zero can bypass the security on some Sentry Safe electronic safes using an output from the GPIO.&nbsp;<\/p>\n<p>This is definitely not something you want to be doing if it isn&#8217;t your safe or you don&#8217;t have permission, but it goes to show just how insecure the &#8220;complimentary&#8221; safes found in hotels, spas, and Airbnbs actually are.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"0ecfec0d-98c7-40d2-afcf-aaa9107dbd58\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"11.069471624266\">\n<div class=\"c-ShortcodeContent\" readability=\"38.538160469667\">\n<p>Flipper Zero can act as a <a href=\"https:\/\/www.zdnet.com\/article\/fbi-cybercriminals-are-mailing-out-usb-drives-that-will-install-ransomware\/\">BadUSB device<\/a>, which means that when connected to a port it is seen as a Human Interface Device (HID), such as a keyboard.&nbsp;<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-iphone-vpn\/\"><strong>The best VPN services for iPhone and iPad (yes, you need to use one)<\/strong><\/a><\/p>\n<p>A BadUSB device can change system settings, open backdoors, retrieve data, initiate reverse shells, or do anything that can be achieved with physical access. These tasks are completed by using a set of commands written in the Rubber Ducky Scripting Language, also known as <a href=\"https:\/\/docs.hak5.org\/hak5-usb-rubber-ducky\/ducky-script-basics\/hello-world\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">DuckyScript<\/a>.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\"><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Flipper Zero opens a browser and navigates to a webpage with no user input.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET<\/span><\/figcaption><\/figure>\n<div id=\"c430499e-fa24-4cad-bf3b-045fc036a82f\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"7\">\n<div class=\"c-ShortcodeContent\" readability=\"34\">\n<p>The Flipper Zero can use the GPIO to output electrical signals and act as a signal generator. I last used this to simulate an antilock braking system module on a vehicle to confirm that all the wiring and computers in the car were working.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"f084b423-70dc-4544-ab21-71b08e45f3ae\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"17.984583761562\">\n<div class=\"c-ShortcodeContent\" readability=\"54.900308324769\">\n<p>The Video Game Module is powered by the RP2040 microcontroller developed by Raspberry Pi and adds a bunch of gaming-related functionality.<\/p>\n<p>First, it adds a DVI video output port to the Flipper Zero, allowing it to send video to external displays. This is essential since the tiny LED panel built into the Flipper Zero isn&#8217;t ideal for gaming. This capability isn&#8217;t limited to gaming, though. The ability to beam video output to a larger display is great for various other applications, such as testing or training.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/if-you-like-your-flipper-zero-then-youll-love-this\/\">If you like your Flipper Zero, then you&#8217;ll love this<\/a><\/strong><\/p>\n<p>The Video Game Module also includes an IMU (Inertial Measurement Unit) featuring a TDK ICM-42688-P sensor, which adds a 3-axis gyroscope and a 3-axis accelerometer to the package, allowing it to sense tilting or shaking.<\/p>\n<p>If you&#8217;re not into gaming, that&#8217;s no problem. The RP2040 microcontroller can run applications programmed in C, C++, or MicroPython, making it a versatile addition to the Flipper Zero.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"pinbox-ad79dfb5-0569-4d71-a848-3274e6eb00e8\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Featured reviews<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This weird little device blew up on TikTok, but there&#8217;s more to it than what lies on the surface. Here are some of the most useful features I&#8217;ve discovered.READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-57739","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>One year later: 7 useful things the Flipper Zero can do that still blows my mind 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"One year later: 7 useful things the Flipper Zero can do that still blows my mind 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-22T17:34:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"One year later: 7 useful things the Flipper Zero can do that still blows my mind\",\"datePublished\":\"2024-11-22T17:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/\"},\"wordCount\":1453,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/33157d462c3ff37a25f635d305d39bca755c5a46\\\/2023\\\/01\\\/03\\\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\\\/img-1508.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/\",\"name\":\"One year later: 7 useful things the Flipper Zero can do that still blows my mind 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/33157d462c3ff37a25f635d305d39bca755c5a46\\\/2023\\\/01\\\/03\\\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\\\/img-1508.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-11-22T17:34:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/33157d462c3ff37a25f635d305d39bca755c5a46\\\/2023\\\/01\\\/03\\\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\\\/img-1508.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/33157d462c3ff37a25f635d305d39bca755c5a46\\\/2023\\\/01\\\/03\\\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\\\/img-1508.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One year later: 7 useful things the Flipper Zero can do that still blows my mind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"One year later: 7 useful things the Flipper Zero can do that still blows my mind 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/","og_locale":"en_US","og_type":"article","og_title":"One year later: 7 useful things the Flipper Zero can do that still blows my mind 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-11-22T17:34:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"One year later: 7 useful things the Flipper Zero can do that still blows my mind","datePublished":"2024-11-22T17:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/"},"wordCount":1453,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/","url":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/","name":"One year later: 7 useful things the Flipper Zero can do that still blows my mind 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280","datePublished":"2024-11-22T17:34:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/33157d462c3ff37a25f635d305d39bca755c5a46\/2023\/01\/03\/fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\/img-1508.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/one-year-later-7-useful-things-the-flipper-zero-can-do-that-still-blows-my-mind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"One year later: 7 useful things the Flipper Zero can do that still blows my mind"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57739"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57739\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}