Proxmark3 Alternatives

Similar projects and alternatives to proxmark3

  1. InfluxDB

    InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.

    InfluxDB logo
  2. flipperzero-firmware

    Flipper Zero firmware source code

  3. unleashed-firmware

    Flipper Zero Unleashed Firmware

  4. Flipper-IRDB

    A collective of different IRs for the Flipper

  5. rpitx

    RF transmitter for Raspberry Pi

  6. urh

    36 proxmark3 VS urh

    Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

  7. mfkey32v2

    Mifare Classic Key Calculator v2

  8. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
  9. proxmark3

    Proxmark 3 (by Proxmark)

  10. MifareClassicTool

    An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.

  11. ProxSpace

    Proxmark III develoment environment for Windows

  12. ChameleonMini

    The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.

  13. miLazyCracker

    Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader

  14. secplus

    7 proxmark3 VS secplus

    A software implementation of the Security+ system used by garage door openers

  15. Mifare-Windows-Tool

    Discontinued Mifare windows tool

  16. ChameleonMini

    The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page (by RfidResearchGroup)

  17. flipperscope

    Attempt at an oscilloscope application for the flipper zero. Measures voltage and frequency.

  18. odiin

    Attempts at nRF52840 ISO 14443-A magic!

  19. libnfc

    Platform independent Near Field Communication (NFC) library

  20. NFC-Copy-Cat

    NFC Copy Cat is a small device that combines two powerful cybersecurity tools, NFCopy and MagSpoof. NFCopy works by reading or emulating a NFC card; depending on the necessities of the researcher.

  21. apple-vas

    Researching Apple VAS protocol

  22. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better proxmark3 alternative or higher similarity.

proxmark3 discussion

Log in or Post with

proxmark3 reviews and mentions

Posts with mentions or reviews of proxmark3. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-12-15.
  • Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag
    2 projects | news.ycombinator.com | 15 Dec 2024
    My read of the proxmark code (https://github.com/RfidResearchGroup/proxmark3/blob/master/c...) is that the `ndefformat` formatted the tag MAD (https://www.nxp.com/docs/en/application-note/AN10787.pdf), which you'd do for NDEF, then had a single TLV TERMINATOR at the block where the NDEF message starts. Then he used NFC Tools to write on an NDEF text record (which iOS background reading would ignore) and maybe something else? After that he then used `ndefwrite` to write on a URL record. I wonder if he could have skipped the NFC Tools and written the URL record and gotten the same result. Proxmark dumps before and after using NFC Tools would be insightful.
  • MicroPython on Flipper Zero
    3 projects | news.ycombinator.com | 19 Sep 2024
    You may bump into limits of your Proxmark clone with hardnested cracking - it's memory intensive, and most of the Proxmark Easy clones have reduced RAM.

    There's actually an auto_crack LUA script on proxmark ( Use this fork: https://github.com/RfidResearchGroup/proxmark3 ) which will take most of the hassle out of cracking.

    Cracking requires very, very precise timing: In a nutshell, you're trying to predict nonces / PRNG values, by sending very precicesly timed requests, and then later cracking those results.

    The Flipper has limited CPU power - its main "attack vector" against MIFARE is a very large keylist / dictionary of common MIFARE keys. It's slow and dumb, but it works for most cases. It can also do limited cracking, depending on the type required.

    The Proxmark is built around an FPGA, and can crack much, much more efficiently.

  • Flipper Zero: Multi-Tool Device for Geeks
    9 projects | news.ycombinator.com | 21 Jan 2024
    I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]

    To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).

    High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).

    [0] https://github.com/RfidResearchGroup/proxmark3

    [1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...

    [2] https://www.youtube.com/watch?v=zKOAywZqisc

  • Proxmark3 Unleashes 'Faraday': A Leap Forward
    1 project | /r/proxmark3 | 29 Nov 2023
  • Announcing 'Raccoon' - The Latest Proxmark3 Release!
    1 project | /r/proxmark3 | 11 Sep 2023
    🔗 https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
  • vending machine nfc
    2 projects | /r/hacking | 4 Jul 2023
  • Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
    1 project | /r/DangerousThings | 29 Jun 2023
    After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
  • Unknown USB Device on Proxmark3 Easy
    2 projects | /r/proxmark3 | 24 Jun 2023
    you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
  • Is it possible to copy an iClass card into a MiFare 1k card?
    1 project | /r/proxmark3 | 10 Jun 2023
    You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
  • Question about sector 0 block 0
    1 project | /r/RFID | 27 May 2023
  • A note from our sponsor - InfluxDB
    www.influxdata.com | 16 May 2025
    InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now. Learn more →

Stats

Basic proxmark3 repo stats
62
4,530
9.9
3 days ago

Sponsored
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com