PN532Killer is the reader, emulator and sniffer of ISO14443, ISO15693 and LF Tag such as EM4100.
Frequently Asked Questions
What can PN532Killer do?
- Emulation as a PN532 chip for open sources libraries supported
- Standard card reader for all platforms supports
- Sniffing communications from original tags
What kind of tags do PN532Killer can emulate?
- ISO14443A Tag
- Mifare Classic 1K
- Mifare Ultralight
- ISO15693 Tag
- ICode
Why do we start PN532Killer?
The performance of PN532 with nested attack performance worst. And it does not support on sniffing features for Mfkey32v2 and Mfkey64. Also PN532 chip does not support Mifare Emulation, so we made it on PN532Killer.
How can PN532Killer recover keys?
- Nested attack
- Hardnested – 2x speed of collecting nonce than PN532
- mfkey32v2 – Sniffing without original tag
- mfkey64 – Sniffing with original tag
- Darkside – coming soon
- StaticNested – coming soon
- Relay attack – coming soon
Does PN532Killer work with libnfc
Yes, PN532Killer is compatible with PN532 library and Apps or softwares and even with customized baud rate.
CLI for PN532Killer
A Python-based Command Line Tool for controlling PN532Killer.
Sniff with Tag on PN532Killer
PN532Killer can recover the keys with MFKey64 easily.
Reviews
There are no reviews yet