
DisruptorX V2 is an ESP32-based wireless security and penetration testing tool designed to analyze, jam, spoof, and disrupt Bluetooth Low Energy (BLE) signals. Developed by C1PH3R-FSOCITEY in India, it’s designed for cybersecurity professionals, penetration testers, and ethical hackers for BLE-focused security testing.
Built around an ESP32-WROOM-32 module, DisruptorX V2 supports BLE signal jamming, scanning, spoofing, and packet analysis. It includes a “Sour Apple” mode to exploit BLE vulnerabilities by injecting malicious signals. The tool can impersonate legitimate BLE devices and observe interactions between them, making it suitable for studying protocol behavior and wireless security flaws.
DisruptorX Specifications:
- Wireless Module – ESP32-WROOM-32 module with ESP32 dual-core processor @ 160 MHz, 520 Kbytes SRAM / 4 Mbit Flash, WiFi 802.11 b/g/n, Bluetooth 4.2
- Display – 0.96″ OLED display
- Functions
- BLE signal jamming
- BLE signal spoofing (device impersonation)
- BLE packet analysis and scanning
- “Sour Apple” mode for signal injection exploits
- USB – Micro USB port for power, programming, and debugging
- Misc
- 3x NRF24L01 2.4GHz wireless transceivers modules
- 5x navigation buttons for controls
- Power – 5V from microUSB port
- Dimensions – not mentioned

DisruptorX V2, or as the company calls it, the FreqF***ker Ultra (See Bluetooth speaker disruption demo there), runs on custom firmware built for the ESP32 and runs the “Sour Apple” exploit routines via custom scripts. Other than that, not much information is available from the developers. I found C1PH3R.FSOCITEY’s GitHub account, but there is no information available about this particular board. You can check out their Instagram page for more such devices. It looks like they may be using nRFBOX firmware on the device, but don’t refer to it in the product description.
The image shows that the device includes three NRF24L01 2.4GHz wireless transceiver modules, although their specific purpose isn’t explicitly mentioned. Based on common usage in security tools, it’s likely they are used for sniffing, packet injection, or mousejacking attacks. Sour Apple is a BLE spoofing and injection attack technique that targets the trust model used by many BLE devices, especially HID (Human Interface Device) peripherals like wireless keyboards, mice, and headsets.

Sour Apple Mode is a BLE spoofing technique that tricks devices into reconnecting to fake peripherals by imitating trusted Bluetooth identities. It injects malicious advertising or connection signals to confuse, interrupt, or exploit poorly secured BLE communications. Named after attacks mimicking Apple accessories, it highlights flaws in how many devices auto-reconnect without reauthentication.
Previously, we have seen various Wi-Fi and RF-based pen testing tools, like Mayhem v2, an all-in-one ESP32 and NRF24L01-based expansion board, the Interrupt Raspberry Pi Zero-based wireless hacking tool, and Deauther Watch X for IR and Wi-Fi hacking. But it’s less common to see a product that is designed to analyze, jam, spoof, and disrupt Bluetooth Low Energy (BLE) signals.
The DisruptorX V2 is available on Tindie for $36.00. At the time of writing, there is a 10% discount going on when purchasing two or more.

Debashis Das is a technical content writer and embedded engineer with over five years of experience in the industry. With expertise in Embedded C, PCB Design, and SEO optimization, he effectively blends difficult technical topics with clear communication
Support CNX Software! Donate via cryptocurrencies, become a Patron on Patreon, or purchase goods on Amazon or Aliexpress. We also use affiliate links in articles to earn commissions if you make a purchase after clicking on those links.