Skip to product information
1 of 1

Mini RFID Reader/Writer WS1850S

Mini RFID Reader/Writer WS1850S

$15.99 $25.99
local_offer SAVE 38%
Tax calculated at checkout. Free shipping on all orders!
M5Shark is a compact, all-in-one device for ethical hacking, IoT projects, and remote control tasks — featuring Wi-Fi, Bluetooth, and IR capabilities, powered by ESP32.
  • settings_remote Take control of your world
  • touch_app Easy to use
  • flash_on Viral product, low stock
local_shipping FREE SHIPPING ends in 24h!
Fast
Shipping
Free
Returns
30-Day
Guarantee
  • Visa
  • Mastercard
  • Apple Pay
  • Shop Pay
  • Klarna
  • PayPal
M5Shark Guide eBook
M5Shark Guide eBook
INCLUDES FULL Setup, Themes & Hacks
$0.00
$19.99
Mark

“Absolutely loved the M5. Super useful in real-world tests.”

★★★★★

Mark M. — Verified Buyer

Sophie

“Got it as a gift. Ended up ordering two more 😍”

★★★★★

Sophie D. — Verified Buyer

Jason

“Compact, clean, works exactly as promised.”

★★★★★

Jason R. — Verified Buyer

View full details

M5Shark Toolkit

All-in-one ethical hacking device — compact, powerful, beginner-friendly, and made for real-world testing.

What people think about us

Real reviews from M5Shark customers who ordered and loved it!

POWERFUL HACKING TOOLS WITH M5SHARK
NO TECH SKILLS REQUIRED
100% ETHICAL & TESTED GEAR
ALL-IN-ONE HACKING DEVICES
READY TO USE OUT OF THE BOX
TRUSTED BY 10,000+ USERS
POWERFUL HACKING TOOLS WITH M5SHARK
NO TECH SKILLS REQUIRED
100% ETHICAL & TESTED GEAR
ALL-IN-ONE HACKING DEVICES
READY TO USE OUT OF THE BOX
TRUSTED BY 10,000+ USERS

T6Shark Plus

Both theCC1101chip and the antenna are designed to operate at frequencies in the 300-348 MHz, 387-464 MHz, and 779-928 MHz bands.

Buy it Now

Ethical Hacking & Security Research

Wireless Security Analysis

Perform legal network scanning and penetration testing with ESP32's Wi-Fi/Bluetooth capabilities

Customizable Scripts

Develop security tools using Arduino IDE, MicroPython, or UIFlow for ethical hacking purposes

Portable Penetration Kit

Compact design for on-site security audits and vulnerability assessments

Sensor Integration

Use built-in sensors for environmental monitoring during security operations