proxmark3
MifareClassicTool
proxmark3 | MifareClassicTool | |
---|---|---|
60 | 10 | |
3,465 | 4,245 | |
1.9% | - | |
9.9 | 8.6 | |
6 days ago | 3 months ago | |
C | Java | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
proxmark3
-
Flipper Zero: Multi-Tool Device for Geeks
I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]
To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).
High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).
[0] https://github.com/RfidResearchGroup/proxmark3
[1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...
[2] https://www.youtube.com/watch?v=zKOAywZqisc
- Proxmark3 Unleashes 'Faraday': A Leap Forward
-
Announcing 'Raccoon' - The Latest Proxmark3 Release!
🔗 https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
- vending machine nfc
-
Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
-
Unknown USB Device on Proxmark3 Easy
you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
-
Is it possible to copy an iClass card into a MiFare 1k card?
You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
- Question about sector 0 block 0
-
On-site Encrypted Access Control System?
Grab yourself a Proxmark3, read the instructions here, and you can extract your iClass elite key in a few seconds. You can pick up a PM3 easy for a few bucks.
-
Dangerous Things guide, errors during compile
I cloned whatever the latest commit was at https://github.com/RfidResearchGroup/proxmark3, which is what the guide on dangerous things suggests (where I bought my PM).
MifareClassicTool
- MifareClassicTool - An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.
- Adding money to Mifare Classic 1k
-
[request] A tweak to overwrite 4-but udid of a mifare card
Following this vulnerability: https://timdows.com/projects/using-a-mobile-phone-to-clone-a-mifare-card/ You can overwrite the UDID on a 4-but mifare card Problem is, the only software it links is for android (https://github.com/ikarus23/MifareClassicTool)
-
Cloning ISIC card to phone
Played with https://github.com/ikarus23/MifareClassicTool ?
-
Android NFC App capabilities? What can and can't you do with the NFC API's?
Yes
-
⟳ 0 apps added, 24 updated at f-droid.org
MIFARE Classic Tool (version 4.0.3): An NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.
- So, I bought the wrong NFC tag ( again )
-
Help With Mifare Classic Tags
Note that some phones that don't have a NFC chip made by NXP don't fully support Mifare Classic tags. See this list and this one.
-
Store NFC-cards in app
Do you know what types of cards they are? Can you read them with https://github.com/ikarus23/MifareClassicTool/ ? What does https://play.google.com/store/apps/details?id=com.nxp.taginfolite&hl=en&gl=US say about them?
What are some alternatives?
flipperzero-firmware - Flipper Zero firmware source code
Mifare-Windows-Tool - Mifare windows tool
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page
react-native-nfc-manager - React Native NFC module for Android & iOS
miLazyCracker - Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
TagMo
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
Rucky - A simple to use USB HID Rubber Ducky Launch Pad for Android.
ProxSpace - Proxmark III develoment environment for Windows
warpinator-android - An unofficial implementation of Warpinator for Android
libnfc - Platform independent Near Field Communication (NFC) library
Dawn - Here lies the fork of greatest open-source Reddit app