proxmark3
secplus
proxmark3 | secplus | |
---|---|---|
60 | 6 | |
3,465 | 228 | |
1.9% | - | |
9.9 | 7.7 | |
7 days ago | about 2 months ago | |
C | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
proxmark3
-
Flipper Zero: Multi-Tool Device for Geeks
I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]
To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).
High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).
[0] https://github.com/RfidResearchGroup/proxmark3
[1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...
[2] https://www.youtube.com/watch?v=zKOAywZqisc
- Proxmark3 Unleashes 'Faraday': A Leap Forward
-
Announcing 'Raccoon' - The Latest Proxmark3 Release!
🔗 https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
- vending machine nfc
-
Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
-
Unknown USB Device on Proxmark3 Easy
you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
-
Is it possible to copy an iClass card into a MiFare 1k card?
You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
- Question about sector 0 block 0
-
On-site Encrypted Access Control System?
Grab yourself a Proxmark3, read the instructions here, and you can extract your iClass elite key in a few seconds. You can pick up a PM3 easy for a few bucks.
-
Dangerous Things guide, errors during compile
I cloned whatever the latest commit was at https://github.com/RfidResearchGroup/proxmark3, which is what the guide on dangerous things suggests (where I bought my PM).
secplus
-
Flipper Zero: Multi-Tool Device for Geeks
For Chamberlain brands [0] there is some research that shows that their rolling code system (Security+ and Security+ 2.0) is quite easy to decode/decrypt [1]. This feature is supported in the flipper firmware, but is restricted (you can't create a custom remote, only clone is supported) without custom firmware. However, I'm sure you could decode a raw capture file if needed in a pinch.
[0] https://chamberlaingroup.com/our-brands
[1] https://github.com/argilo/secplus
-
Home Assistant blocked from integrating with Garage Door opener API
A gentle reminder that the Security+ and Security+ 2.0 RF protocols have been reverse engineered (https://github.com/argilo/secplus). While they are not the most secure thing in the world, you can build a custom RF transmitter (remote) that is network connected.
Having done some research into Chamberlain's products, I don't recommend anyone to use them if they have the choice.
- Woman scanned my garage door??
- How to Simulate a Garage Door (not the opener)
-
X-Post r/hardwarehacking - serial communication between two micro controllers
This is not an attempt to break the RF Security+ encryption that this, and other garage doors utilize. That has already happened. https://github.com/argilo/secplus
-
Chamberlain MyQ local control options?
Here is the rolling code project: https://github.com/argilo/secplus
What are some alternatives?
flipperzero-firmware - Flipper Zero firmware source code
rat-ratgdo - Open source schematics for ratgdo PCB
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page
ratgdo
miLazyCracker - Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
esphome-ratgdo - ratgdo for ESPHome
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
pymyq - Python wrapper for MyQ API
ProxSpace - Proxmark III develoment environment for Windows
tuya-local - Local support for Tuya devices in Home Assistant
libnfc - Platform independent Near Field Communication (NFC) library
nixpkgs - Nix Packages collection & NixOS