ESP-RFID-Tool v2: Making it "bulletproof" against overvoltage + direct UID parsing for Flipper Zero

ESP-RFID-Tool v2: Making it "bulletproof" against overvoltage + direct UID parsing for Flipper Zero

Hi everyone,

I’ve been working on a major evolution of the ESP-RFID-Tool (successor to the v1 and similar boards like the ESPKey). While these tools are great for research, they are notoriously fragile. One voltage spike or an unstable power source from a controller, and the board is toast.

For the v2, I’ve focused on two main pillars: Resilience and Intelligence.

What’s new?

  • ⚡ Hardware Hardening: I’ve redesigned the power stage to be much more robust. It now survives higher voltages that would be a "death sentence" for original boards (final design s still WIP).
  • 🔍 Onboard Parsing (The Game Changer): Most tools are just "dumb" recorders of bitstreams. The v2 includes an advanced parser that understands the data. It extracts the original Card ID/UID directly from the stream.
  • 🐬 Flipper Zero Ready: Because the tool parses the actual UID, you don’t have to mess around with raw binary dumps. You can take the ID and immediately enter it into your Flipper Zero for emulation. It bridges the gap between "sniffing" and "acting" perfectly.
  • 📈 Reliable Replay: Improved timing for much cleaner signal replaying during audits.

I just received the prototype batch from PCBWay, and the build quality is excellent. I'm currently fine-tuning the hardware and the firmware to make the parsing even more versatile across different protocols.

You can find more details and the backstory on my blog: https://www.foto-video-it.de/2026/it-security/upgrade-esp-rfid-tool-v2-kommt/

I’m curious to hear your thoughts: How many of you have fried your sniffers in the field? And would direct Flipper Zero integration speed up your workflow?

submitted by /u/Einstein2150
[link] [comments]


from hacking: security in practice https://ift.tt/3taZpfJ

Comments