Alternative Firmware Options for Flipper Zero: Choosing the Right Upgrade

Date: 13/07/2025

Flipper Zero is a “hacker multitool” that you’ve probably heard about by now. You might even have managed to get your hands on one and had some fun with it yourself. In this article, we will discuss firmware options that not only enhance your tinkering experience but also aid in conducting actual physical penetration tests with the Flipper.

warning

This article is intended for informational purposes only and is designed for security professionals conducting testing under a contract. The author and publisher are not liable for any harm caused by the misuse of the information provided. The distribution of malware, disruption of systems, and breach of communication privacy are subject to legal penalties.

The standard firmware significantly limits the potential of Flipper Zero. It restricts the interception and analysis of specific frequency signals, such as car alarm signals, and does not support brute-force attacks on protocols that require transmitting specific values. Additionally, it includes a limited number of built-in signals suitable for attacks on popular systems.

The device’s architecture is open, meaning you can install your own firmware, which broadens experimental possibilities. Since the device launched, numerous third-party and community-developed firmware options have emerged, each offering its own unique features and advantages. Let’s take a closer look at them!

Flipper Zero Firmware

Flipper Zero Firmware is the default software that comes pre-installed on the Flipper Zero device when it leaves the factory. It includes a variety of tools but has built-in limitations that prevent users from fully unlocking the device’s technical potential.

Standard home screen
Standard home screen

The firmware will be useful for those who have just purchased a Flipper Zero and want to explore its basic capabilities for everyday use. For instance, you can clone all your access cards and remote controls into it, so you don’t have to carry them around daily.

Profile of our dolphin
Profile of our dolphin

Here are the four sections of the standard firmware that will most significantly vary in custom versions.

  • Sub-GHz — This section enables the interception, recording, and emulation of radio signals. In the standard firmware, this tool has limited capabilities. For instance, when trying to intercept a car key signal, the device may detect it but won’t allow it to be recorded or replayed. This limitation is intentional, as in the wrong hands, this tool could be dangerous.
Sub-GHz RF Interception Tool
Sub-GHz RF Interception Tool
  • Infrared: Infrared signal. Enables control over household appliances. The standard firmware supports four types of devices: TVs, audio players, projectors, and air conditioners.
  • BadUSB: Allows emulation of a wired keyboard when connecting the “Flipper” to a PC. Includes two demo scripts that open Notepad on the connected PC and display the “Flipper” logo as ASCII art.
  • Applications: Contains additional tools not included in any of the previous categories. In the official firmware, this section is primarily notable for allowing you to play the game Snake.
iButton Interaction Interface
iButton Interaction Interface

Unleashed

Unleashed is the first fork of the official firmware that removes regional restrictions from the Flipper Zero and adds new tools. It is available in two versions: the basic version and an extended version, which includes a large number of pre-installed applications.

Unleashed Welcome Screen
Unleashed Welcome Screen

Unleashed is ideal for those who find the basic features of Flipper Zero insufficient. For instance, with this firmware, you can not only intercept, record, and replay signals, but also perform brute-force attacks on systems.

Here, you have access to tools that can automatically cycle through all possible access codes to open a barrier, ensuring it can be opened without intercepting the original signal. In contrast, the official firmware only allows you to record an existing signal and emulate it later.

In the Sub-GHz section, all regional restrictions on signal frequencies have been removed. This means that with the use of Unleashed, you can intercept and emulate virtually any signal that the hardware of the Flipper Zero can access.

Sub-GHz — added display of current scanning information
Sub-GHz — added display of current scanning information

Among other things, the Applications section of this firmware is packed with a wide array of tools for all kinds of scenarios: from a unit converter and a barcode generator to a Brainfuck development environment and a Doom remake.

By the way, if you’re not a fan of the name “Flipper” that it comes with from the factory, Unleashed, along with the other unofficial firmware options mentioned in this article, can help you change it.

Changing the Name
Changing the Name

In other sections, there are also many minor changes. For example, support for classic Mifare keys has been added, along with features for capturing and sending dynamic encrypted protocols and rolling codes.

With the Unleashed firmware, your “Flipper” can now serve as a decent tool for a pentester. Just be careful not to misuse its capabilities, and remember that certain actions can be illegal!

Xtreme

Xtreme is perhaps the perfect balance between the standard firmware and the RogueMaster fork. Essentially, it is a thoroughly revamped official firmware with features borrowed from RogueMaster, but it is significantly more stable.

A custom profile of our dolphin
A custom profile of our dolphin

The main unique innovation is the extensive customization options available for BadUSB/KB. You can also add new features for our “Flipper” (remember, it’s also a virtual pet?), adjust USB/BT modes to work with BadUSB, and manage Sub-GHz protocols. Like the Unleashed firmware, this version allows you to bypass all regional restrictions, perform brute-force attacks, and includes not only all its advantages but also some new features.

Ability to fully customize the dolphin
Ability to fully customize the dolphin’s state

The BadKB function enables keyboard emulation to perform HID attacks. You can use an existing script as a base, which displays a “Flipper” greeting through a text editor on any operating system, including Windows, macOS, iOS, Android, and others. It supports Ducky Script Language 1.0. If you search on GitHub, you’ll find over 500 ready-made payloads using it.

The BadKB has two operating modes: a classic (wired) mode and a Bluetooth mode. The Bluetooth mode can be configured so that the “Flipper” device remembers devices. In subsequent attacks, it will automatically connect to the victim. There’s also the ability to change keyboard layouts and even the MAC address of your cyber dolphin’s BT module.

BadKB Settings
BadKB Settings
Sub-GHz Tool
Sub-GHz Tool

This firmware is designed for advanced users who have a clear understanding of why they need Flipper and all its new features. It is particularly well-suited for physical penetration testing and comprehensive red teaming exercises.

RogueMaster

RogueMaster is a fork of the Unleashed firmware, which is quite similar to the original, but features a unique set of animations. Some of these animations are available for purchase through a Patreon subscription to the creator, RogueMaster.

Home screen of the firmware
Home screen of the firmware
Custom Dolphin Profile
Custom Dolphin Profile

The new features are similar to those in the Xtreme firmware, except that the BadUSB parameters are somewhat limited (there are no Bluetooth settings like in Xtreme). Additionally, this firmware is less stable compared to others we’ve reviewed. It had the highest crash rate in our tests.

The Application section here is essentially a massive list of tools. You can find various fuzzers for iButton, brute-forcers for RFID and Sub-GHz, as well as a CLI mode. However, I advise caution when using the command line—out of ten attempts I made, three caused the system to crash.

Sub-GHz Radio Frequency Sniffer Tool
Sub-GHz Radio Frequency Sniffer Tool
iButton Interaction Interface
iButton Interaction Interface

Overall, support for FAP format applications is expected to be included in the main Flipper firmware soon. As a result, RogueMaster will mostly appeal to those who want to practice debugging and study source codes on their own. Alternatively, you might consider installing it if you’re eager to customize your Flipper Zero’s “passport” by changing not only the avatar but also the background.

Standard Unleashed Xtreme Rogue Master
Regional Restrictions Disabled + + +
Interface Customization + +
Additional Modules + + +
Operational Stability + + +
Update Relevance +/– + +
Doom + + +

Recommendations

After several months of testing and daily use of the Flipper Zero with custom firmware, we can offer some recommendations on choosing the right one for you. First and foremost, decide how you plan to use the device. If you truly intend to conduct advanced attacks (for entirely benign purposes or under a testing contract), then select firmware that provides the necessary features. If such capabilities are not required, there’s no need to compromise the device’s stability.

The best way to start exploring the optional features of the Flipper Zero is to install the extended Unleashed version or the official firmware that includes tools and modules relevant to your needs (many of which are already available in the official Flipper Zero repository).

If you’re into customization, your best options are Xtreme or RogueMaster. However, if stability and advanced features are more important to you, then Unleashed or Xtreme are the way to go. We’ve chosen these two because they are the most stable and practical systems. Throughout our testing and use, they never crashed or hung, unlike RogueMaster. They offer plenty of features, and with Xtreme’s menu-based firmware customization, there’s an added bonus.

Related posts:
2022.06.01 — WinAFL in practice. Using fuzzer to identify security holes in software

WinAFL is a fork of the renowned AFL fuzzer developed to fuzz closed-source programs on Windows systems. All aspects of WinAFL operation are described in the official documentation,…

Full article →
2022.06.01 — Log4HELL! Everything you must know about Log4Shell

Up until recently, just a few people (aside from specialists) were aware of the Log4j logging utility. However, a vulnerability found in this library attracted to it…

Full article →
2022.02.15 — First contact: How hackers steal money from bank cards

Network fraudsters and carders continuously invent new ways to steal money from cardholders and card accounts. This article discusses techniques used by criminals to bypass security…

Full article →
2023.04.20 — Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows

Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found…

Full article →
2022.01.13 — Bug in Laravel. Disassembling an exploit that allows RCE in a popular PHP framework

Bad news: the Ignition library shipped with the Laravel PHP web framework contains a vulnerability. The bug enables unauthorized users to execute arbitrary code. This article examines…

Full article →
2023.07.07 — VERY bad flash drive. BadUSB attack in detail

BadUSB attacks are efficient and deadly. This article explains how to deliver such an attack, describes in detail the preparation of a malicious flash drive required for it,…

Full article →
2022.02.09 — Kernel exploitation for newbies: from compilation to privilege escalation

Theory is nothing without practice. Today, I will explain the nature of Linux kernel vulnerabilities and will shown how to exploit them. Get ready for an exciting journey:…

Full article →
2022.06.03 — Playful Xamarin. Researching and hacking a C# mobile app

Java or Kotlin are not the only languages you can use to create apps for Android. C# programmers can develop mobile apps using the Xamarin open-source…

Full article →
2022.01.13 — Step by Step. Automating multistep attacks in Burp Suite

When you attack a web app, you sometimes have to perform a certain sequence of actions multiple times (e.g. brute-force a password or the second authentication factor, repeatedly…

Full article →
2022.06.01 — Routing nightmare. How to pentest OSPF and EIGRP dynamic routing protocols

The magic and charm of dynamic routing protocols can be deceptive: admins trust them implicitly and often forget to properly configure security systems embedded in these protocols. In this…

Full article →