640

View Trend>
MIFARE Classic Tool
Read, write, analyze, etc. MIFARE® Classic RFID-Tags!
Version History
Update Comparison
App Status
  • Latest Version
    4.2.2
  • Time Since Latest Version
    155days23Hour
  • Total Updated Versions (last 1 year)
    5

Version Timeline

Hover over "Icon" to view updates. Click "Icon" to view comparison
Version History
Display Content
Date
  • -
2024 years
4 month
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
5 month
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
6 month
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
7 month
1
2
3
4
5
6
7
8

Version History

  • Version4.2.2
    02/03/2024

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.2.2:
    * Fixed crash when opening the preferences using
    Chinese language.

    Version 4.2.1:
    * Added Russian translation (Thanks to "IIIef").
    * Added Portuguese translation (Thanks to "YaBa").
    * Fixed crash on Samsung Galaxy S24 Ultra
    (Thanks to Eduardo Speroni).
    * Fixed some crashes related to Android 14.

    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write 'dump-wise')
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode & Encode MIFARE Classic Value Blocks
    • Decode & Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It's open source (GPLv3) ;)


    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no "brute-force" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence
    to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information


    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
    • Getting started & other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id=1535


    MIFARE® is a registered trademark of NXP Semiconductors.

  • Version4.2.1
    01/28/2024

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.2.1:
    * Added Russian translation (Thanks to "IIIef").
    * Added Portuguese translation (Thanks to "YaBa").
    * Fixed crash on Samsung Galaxy S24 Ultra
    (Thanks to Eduardo Speroni).
    * Fixed some crashes related to Android 14.
    * Added more well known keys to the extended key file.
    (extended-std.keys file will be updated automatically.)

    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write 'dump-wise')
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode & Encode MIFARE Classic Value Blocks
    • Decode & Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It's open source (GPLv3) ;)


    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no "brute-force" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence
    to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information


    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
    • Getting started & other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id=1535


    MIFARE® is a registered trademark of NXP Semiconductors.

  • Version4.2.0
    01/03/2024

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.2.0:
    * Choosing the language is now possible.
    * Choosing the theme (light/dark) is now possible
    (the light theme is not very good yet).
    * Bugfix: Export dumps in .mct format without corrupting
    (Thanks to "twisteroid ambassador").
    * Bugfix: Writing a block with a readable key B.
    * Fixed several crashes.
    * Updated for Android 14.
    * Some minor code cleanup.

    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write 'dump-wise')
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode & Encode MIFARE Classic Value Blocks
    • Decode & Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It's open source (GPLv3) ;)


    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no "brute-force" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence
    to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information


    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
    • Getting started & other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id=1535


    MIFARE® is a registered trademark of NXP Semiconductors.

  • Version4.1.0
    10/04/2023

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.1.0:
    * Added "Hide Identical Sectors" option and show
    tag data difference in percent for the Diff Tool
    (Thanks to Deun Lee)
    * Added French translation
    (Thanks to Nicolas "iomega11" André)
    * Improved Italian translation
    (Thanks to Nicolas "iomega11" André and
    Erik "ErikPelli" Pellizzon)
    * Updated for Android 13

    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write 'dump-wise')
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode & Encode MIFARE Classic Value Blocks
    • Decode & Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It's open source (GPLv3) ;)


    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no "brute-force" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence
    to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information


    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
    • Getting started & other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id=1535


    MIFARE® is a registered trademark of NXP Semiconductors.

  • Version4.0.5
    08/18/2023

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.0.5:
    • Added more well known keys to the extended key file.
    (extended-std.keys file will be updated automatically.)
    • Bugfix: Ignore saved default sector range for the
    factory format function. Thanks to David "baudav" Baumann.
    • Bugfix/Workaround: Try to write block twice, if needed.
    Thanks to "btwang0512".
    • Some minor code cleanup.

    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write 'dump-wise')
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode & Encode MIFARE Classic Value Blocks
    • Decode & Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It's open source (GPLv3) ;)


    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no "brute-force" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence
    to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information


    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
    • Getting started & other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id=1535


    MIFARE® is a registered trademark of NXP Semiconductors.

  • Version4.0.4
    11/23/2021

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.0.4:
    • Bugfix: Discover tags correctly again.

    Version 4.0.3:
    • Added more well known keys to the extended key file.
    (extended-std.keys file will be updated automatically.)
    • Bugfix: Prevent crash when key editor loads from saved instance.
    • Some minor bug fixes.

    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write 'dump-wise')
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode & Encode MIFARE Classic Value Blocks
    • Decode & Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It's open source (GPLv3) ;)


    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no "brute-force" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence
    to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information


    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
    • Getting started & other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id=1535


    MIFARE® is a registered trademark of NXP Semiconductors.

  • Version4.0.2
    12/03/2020
    Size:2.4M

    Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

    Update Log

    Version 4.0.2:
    • Various minor improvements (layout, usage, code base).
    • Updated Chinese translation. Thanks to "Nkh0472".
    • Some minor bug fixes.
    Version 4.0.1:
    • ...
    Version 4.0.0:
    • Permission to read/write external storage (SD card) has been dropped.
    https://www.icaria.de/mct/help-and-info/#storage
    • ...
    Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

    Screenshots
    App Description

    This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.

    GENERAL INFORMATION
    This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
    It is designed for users who have at least basic familiarity with the MIFARE Classic technology.
    Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.

    My dump/key files are gone after updating MCT!
    No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326

    FEATURES
    • Read MIFARE Classic tags
    • Save and edit the tag data you read
    • Write to MIFARE Classic tags (block-wise)
    • Clone MIFARE Classic tags
    (Write dump of a tag to another tag; write \u0027dump-wise\u0027)
    • Key management based on dictionary-attack
    (Write the keys you know in a file (dictionary).
    MCT will try to authenticate with these
    keys against all sectors and read as much as possible.)
    • Format a tag back to the factory/delivery state
    • Write the manufacturer block of special MIFARE Classic tags
    • Create, edit and save key files (dictionaries)
    • Decode \u0026 Encode MIFARE Classic Value Blocks
    • Decode \u0026 Encode MIFARE Classic Access Conditions
    • Compare dumps (Diff Tool)
    • Display generic tag information
    • Display the tag data as highlighted hex
    • Display the tag data as 7-Bit US-ASCII
    • Display the MIFARE Classic Access Conditions as a table
    • Display MIFARE Classic Value Blocks as integer
    • Calcualate the BCC
    • Quick UID clone feature
    • Import/export to common file types
    • In-App (offline) help and information
    • It\u0027s open source (GPLv3) ;)

    IMPORTANT NOTES
    Some important things are:
    • The features this tool provides are very basic. There are no such
    fancy things like saving a URL to an RFID-Tag with a nice looking
    graphical user interface. If you want so save things on a tag,
    you have to input the raw hexadecimal data.
    • This App can NOT crack/hack
    any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
    need keys for this specific tag first. For additional information
    please read/see Getting Started from the links section.
    • There will be no \"brute-force\" attack
    capability in this application. It is way too slow due
    to the protocol.
    • The first block of the first sector of an original
    MIFARE Classic tag is read-only i.e. not writable. But there
    are special MIFARE Classic tags (aka magic tag gen2) that
    support writing to the manufacturer block with a simple write command.
    This App is able to write to such tags and can therefore create fully
    correct clones. However, some special tags require a special command
    sequence to put them into the state where writing to the manufacturer
    block is possible.
    These tags will not work.
    Remember this when you are shopping for special tags!
    • This app will NOT work on some devices because
    their hardware (NFC-controller) does not support MIFARE Classic
    ( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
    You can find a list of unsupported devices here:
    https://github.com/ikarus23/MifareClassicTool#general-information

    LINKS
    • Project Page on github:
    https://github.com/ikarus23/MifareClassicTool
    • MIFARE Classic Tool on F-Droid:
    https://f-droid.org/repository/browse/?fdid\u003dde.syss.MifareClassicTool
    • Getting started \u0026 other help:
    https://github.com/ikarus23/MifareClassicTool#getting-started
    • Bug tracker:
    IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
    https://github.com/ikarus23/MifareClassicTool/issues
    • Additional stuff:
    http://publications.icaria.de/mct/
    • Thread at the Proxmark3 Forum:
    http://www.proxmark.org/forum/viewtopic.php?id\u003d1535

    MIFARE® is a registered trademark of NXP Semiconductors.