Our great sponsors
proxmark3 | proxmark3 | |
---|---|---|
60 | 12 | |
3,465 | 3,011 | |
3.8% | 2.7% | |
9.9 | 0.0 | |
6 days ago | 3 months ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
proxmark3
-
Flipper Zero: Multi-Tool Device for Geeks
I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]
To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).
High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).
[0] https://github.com/RfidResearchGroup/proxmark3
[1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...
[2] https://www.youtube.com/watch?v=zKOAywZqisc
- Proxmark3 Unleashes 'Faraday': A Leap Forward
-
Announcing 'Raccoon' - The Latest Proxmark3 Release!
🔗 https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
- vending machine nfc
-
Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
-
Unknown USB Device on Proxmark3 Easy
you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
-
Is it possible to copy an iClass card into a MiFare 1k card?
You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
- Question about sector 0 block 0
-
On-site Encrypted Access Control System?
Grab yourself a Proxmark3, read the instructions here, and you can extract your iClass elite key in a few seconds. You can pick up a PM3 easy for a few bucks.
-
Dangerous Things guide, errors during compile
I cloned whatever the latest commit was at https://github.com/RfidResearchGroup/proxmark3, which is what the guide on dangerous things suggests (where I bought my PM).
proxmark3
-
what does this mean when reading NFC?
http://cs.ru.nl/~rverdult/Ciphertext-only_Cryptanalysis_on_Hardened_Mifare_Classic_Cards-CCS_2015.pdf https://github.com/Proxmark/proxmark3/wiki/Mifare-HowTo
-
I need help cloning my NXP Mifare Classic
Have you tried a mifare darkside attack?
- Mifare 1K Classic Clone Detection
- These cups have chips under them to prevent refills
- Has anyone had any experience using this rfid writer to recolor kyber crystals?
-
Am I able to clone this card?
All PM3 Easys you can buy right now are 'china clones'. The PM3 Easy is considered obsolete and you can no longer get it through Hacker Warehouse which is the only official USA distributor of Proxmark devices. Since it's a GPL'ed project with all the Eagle CAD files in the repo, whoever wants to can make and sell them and unfortunately the economics of the electronics industry right now don't really point to the low-priced alternative to the RDV4 being produced in the USA.
-
Anyone know if this proxmark is legit?
What do you mean by legit? Proxmark is a GPLed project and made by whoever wants to make them. To the best of my knowledge there is no such thing as an ‘authentic’ Proxmark unless Jonathan Westhues himself built it for you, since he was the original creator of the device. It’s open source hardware; full schematics are here. Pretty much all of them are made overseas by contract manufacturers.
-
NFC cloning questions from a newbie
So with "proxmark 3" you mean the Github-project, right? I assume that I would also need NFC reader/writer hardware.
-
Calling out for package maintainers!
Both official repository https://github.com/Proxmark/proxmark3/releases/tag/v3.1.0
- Proxmark3 easy issue
What are some alternatives?
flipperzero-firmware - Flipper Zero firmware source code
ProxSpace - Proxmark III develoment environment for Windows
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page
mfoc - Mifare Classic Offline Cracker
miLazyCracker - Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
mfcuk - MiFare Classic Universal toolKit (MFCUK)
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
libnfc - Platform independent Near Field Communication (NFC) library
Mifare-Windows-Tool - Mifare windows tool
mercury-api - Haskell binding to Mercury API for ThingMagic RFID readers