ACR122U-tutorial
Tutorial for writing a C/C++ app with the ACR122U on Linux (by Rylern)
mfkey32v2
Mifare Classic Key Calculator v2 (by equipter)
ACR122U-tutorial | mfkey32v2 | |
---|---|---|
1 | 14 | |
21 | 701 | |
- | - | |
1.8 | 2.0 | |
over 2 years ago | 9 months ago | |
C | C | |
MIT License | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ACR122U-tutorial
Posts with mentions or reviews of ACR122U-tutorial.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Create a C/C++ app with the ACR122U (Linux)
Let's now create the application. I will use the C language with the gcc compiler, but it's also compatible in C++ with g++. To communicate with the reader, we are going to use the PC/SC Lite API (WinSCard). All the code is written is a main.c file which is available on GitHub.
mfkey32v2
Posts with mentions or reviews of mfkey32v2.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-02-21.
-
[Flipper Zero] Méthode de fissuration de la clé classique de Mifare
[https://github.com/equipter/mfkey32v2
- What does Manual Attack do?
- Detect Reader
-
Cloning Hotel Room Keys
you can because https://github.com/equipter/mfkey32v2 exists. and i know it exists because i put it there before i put it in unleashed and it’s why this works.
- link 14
-
(New to this!) Read the tag but then didn’t work when emulating? What am I doing wrong? Thanks!
nonces, they are used for cracking the key of a particular tag using a tool called mfkey32. If you'd like to learn more about mfkey32 I would suggest you check out the GitHub https://github.com/equipter/mfkey32v2 on the flipper side its all there for you and you just need to press a few buttons
-
Looking for mifare classic 1k keys collection/dictionaries.
a larger dictionary doesn’t guarantee success you’re just filling the file with bloat. https://github.com/equipter/mfkey32v2 can help you in retrieving the rest of the keys.
- Won’t finish reading :(
-
PSA: Mfkey32 available in the phone app!
That's not this at all. This is about NFC, not what Flipper calls RFID, and this is specific to Mifare Classic. Nothing to do with active vs passive tags. Check out https://github.com/equipter/mfkey32v2 for some details.
-
A simple shell script to automate mfkey32 cracking
if you wanted to open a PR into the https://github.com/equipter/mfkey32v2 repo id happily add this along with credits and instructions in the readme
What are some alternatives?
When comparing ACR122U-tutorial and mfkey32v2 you can also consider the following projects:
WSCT-Core - Public repository for WSCT Core project.
FlipperZero - A Collection of Flipper Zero Scripts / Applications / ETC...
NFC-Copy-Cat - NFC Copy Cat is a small device that combines two powerful cybersecurity tools, NFCopy and MagSpoof. NFCopy works by reading or emulating a NFC card; depending on the necessities of the researcher.
flipperzero - A collection of flipper zero stuff
flipperzero-nfc-tools - Repository contains nfc tools for Flipper companions
proxmark3 - Iceman Fork - Proxmark3
ClassicConverter - Mifare Classic Binary -> NFC file converter
ish - Linux shell for iOS
flipperzero-firmware - Flipper Zero firmware source code