Six months of design iterations, sourcing headaches, and a broken oscilloscope later — I am pleased to share a hardware module I designed to extend the Flipper ecosystem for RF security research. This write-up covers the motivation, engineering challenges, capabilities, and responsible-disclosure principles behind the project — and a frank look at a vulnerability that is very much alive in the Maldives today. Left: 3D render of final PCB · Right: Altium Designer PCB layout view Why I Built It The trigger was reading the original MouseJack disclosure by Bastille Networks. It made me realize that a class of peripherals most people assume to be harmless — the cheap wireless mouse on your desk — can be weaponized from a car park. I wanted a research platform small enough to carry in a jacket pocket, native to the Flipper Zero ecosystem, and capable of passive scanning, protocol analysis, and controlled lab tests. What I...
Today i completed the DTMF decoding circuit and interface it to the micro controller and DTMF tone was generated by the PC and fed to the decoder. After all the connections i wrote a test code for micro controller to get the decoded signal. With an interrupt i manage to get the decoded values from the tone generated. To view what i am getting i connected the LCD and found some problems and after a while i menage to fix it. from the flow you can see how it works. Then i have to test this from a mobile phone and for that i need to make a small preamplifier to control the volume.