Six months of design iterations, sourcing headaches, and a broken oscilloscope later — I am pleased to share a hardware module I designed to extend the Flipper ecosystem for RF security research. This write-up covers the motivation, engineering challenges, capabilities, and responsible-disclosure principles behind the project — and a frank look at a vulnerability that is very much alive in the Maldives today. Left: 3D render of final PCB · Right: Altium Designer PCB layout view Why I Built It The trigger was reading the original MouseJack disclosure by Bastille Networks. It made me realize that a class of peripherals most people assume to be harmless — the cheap wireless mouse on your desk — can be weaponized from a car park. I wanted a research platform small enough to carry in a jacket pocket, native to the Flipper Zero ecosystem, and capable of passive scanning, protocol analysis, and controlled lab tests. What I...
Finally able to flash the Arduino bootloader it to fresh Atmega1284P via my version of ISP programmer. ISP programmer includes and Atmega328P and FTDI board for serial communication between PC and the Atmega328P. Armega328 is loaded with ArduinoISP sketch. This works with Arduino 1.0.1(old version that i use for test) IDE and still testing for Arduino 1.5(i have upgraded to). Once the following files installed to the Arduino Hardware folder ( https://github.com/maniacbug/mighty-1284p/zipball/master ) please mind to restart the application. After restart you will see from the hardware list as Original Mighty 1284p 16 and 8MHz. Select the hardware, port and the programmer as Arduino ISP and burn the bootloader. This process takes quite sometime and after its loaded, do a test by loading blink sketch. Use upload using programmer button to upload the sketch. Blink sketch on test.. cool it works for me. I am trying to workout this method in version 1.5 too, as soo...