mfkey32v2
ClassicConverter
mfkey32v2 | ClassicConverter | |
---|---|---|
14 | 5 | |
702 | 90 | |
- | - | |
2.0 | 0.0 | |
8 months ago | over 1 year ago | |
C | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mfkey32v2
-
[Flipper Zero] Méthode de fissuration de la clé classique de Mifare
[https://github.com/equipter/mfkey32v2
- What does Manual Attack do?
- Detect Reader
-
Cloning Hotel Room Keys
you can because https://github.com/equipter/mfkey32v2 exists. and i know it exists because i put it there before i put it in unleashed and it’s why this works.
- link 14
-
(New to this!) Read the tag but then didn’t work when emulating? What am I doing wrong? Thanks!
nonces, they are used for cracking the key of a particular tag using a tool called mfkey32. If you'd like to learn more about mfkey32 I would suggest you check out the GitHub https://github.com/equipter/mfkey32v2 on the flipper side its all there for you and you just need to press a few buttons
-
Looking for mifare classic 1k keys collection/dictionaries.
a larger dictionary doesn’t guarantee success you’re just filling the file with bloat. https://github.com/equipter/mfkey32v2 can help you in retrieving the rest of the keys.
- Won’t finish reading :(
-
PSA: Mfkey32 available in the phone app!
That's not this at all. This is about NFC, not what Flipper calls RFID, and this is specific to Mifare Classic. Nothing to do with active vs passive tags. Check out https://github.com/equipter/mfkey32v2 for some details.
-
A simple shell script to automate mfkey32 cracking
if you wanted to open a PR into the https://github.com/equipter/mfkey32v2 repo id happily add this along with credits and instructions in the readme
ClassicConverter
-
Skylander NFC
I don’t know what FFF format means, but if you have bin then your first stop would be https://github.com/equipter/ClassicConverter and then you’d need to figure out if you need custom SAK/ATQA.
- Any insight on pulling keys from MiFare via Proxmark3 and adding to flipper?
-
Convert Flipper NFC file to Proxmark3 dump?
Yet another that converts Mifare Classic BINs > Flipper, but not the other way.
-
crack mifare with proxmark then emulate on flipper
use https://github.com/equipter/ClassicConverter to change the files over to flipper format
-
Clone RFID card with known security key, possible ?
yes u can. if youve already cracked it using mfoc you can use https://github.com/equipter/ClassicConverter to convert the output from mfoc to a flipper file
What are some alternatives?
FlipperZero - A Collection of Flipper Zero Scripts / Applications / ETC...
RC522-Attendance - Raspberry Pi based RFID Attendance System
flipperzero - A collection of flipper zero stuff
Mifare-Windows-Tool - Mifare windows tool
flipperzero-nfc-tools - Repository contains nfc tools for Flipper companions
flipper_toolbox - Random scripts for generating Flipper data files.
proxmark3 - Iceman Fork - Proxmark3
MifareClassicTool - An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.
ish - Linux shell for iOS
Flipper - Playground (and dump) of stuff I make or modify for the Flipper Zero
flipperzero-firmware - Flipper Zero firmware source code
PiFare - RFIC tool (in python) working with Raspberry and RC522 module