We use cookies and other technologies on this website to enhance your user experience.
By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.

About MIFARE Classic Tool

Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.

GENERAL INFORMATION

This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.

It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.

My dump/key files are gone after updating MCT!

No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326

FEATURES

• Read MIFARE Classic tags

• Save and edit the tag data you read

• Write to MIFARE Classic tags (block-wise)

• Clone MIFARE Classic tags

(Write dump of a tag to another tag; write 'dump-wise')

• Key management based on dictionary-attack

(Write the keys you know in a file (dictionary).

MCT will try to authenticate with these

keys against all sectors and read as much as possible.)

• Format a tag back to the factory/delivery state

• Write the manufacturer block of special MIFARE Classic tags

• Create, edit and save key files (dictionaries)

• Decode & Encode MIFARE Classic Value Blocks

• Decode & Encode MIFARE Classic Access Conditions

• Compare dumps (Diff Tool)

• Display generic tag information

• Display the tag data as highlighted hex

• Display the tag data as 7-Bit US-ASCII

• Display the MIFARE Classic Access Conditions as a table

• Display MIFARE Classic Value Blocks as integer

• Calcualate the BCC

• Quick UID clone feature

• Import/export to common file types

• In-App (offline) help and information

• It's open source (GPLv3) ;)

IMPORTANT NOTES

Some important things are:

• The features this tool provides are very basic. There are no such

fancy things like saving a URL to an RFID-Tag with a nice looking

graphical user interface. If you want so save things on a tag,

you have to input the raw hexadecimal data.

• This App can NOT crack/hack

any MIFARE Classic keys. If you want to read/write an RFID-Tag, you

need keys for this specific tag first. For additional information

please read/see Getting Started from the links section.

• There will be no "brute-force" attack

capability in this application. It is way too slow due

to the protocol.

• The first block of the first sector of an original

MIFARE Classic tag is read-only i.e. not writable. But there

are special MIFARE Classic tags (aka magic tag gen2) that

support writing to the manufacturer block with a simple write command.

This App is able to write to such tags and can therefore create fully

correct clones. However, some special tags require a special command

sequence to put them into the state where writing to the manufacturer

block is possible.

These tags will not work.

Remember this when you are shopping for special tags!

• This app will NOT work on some devices because

their hardware (NFC-controller) does not support MIFARE Classic

( https://github.com/ikarus23/MifareClassicTool/issues/1 ).

You can find a list of unsupported devices here:

https://github.com/ikarus23/MifareClassicTool#general-information

LINKS

• Project Page on github:

https://github.com/ikarus23/MifareClassicTool

• MIFARE Classic Tool on F-Droid:

https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool

• Getting started & other help:

https://github.com/ikarus23/MifareClassicTool#getting-started

• Bug tracker:

IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE

https://github.com/ikarus23/MifareClassicTool/issues

• Additional stuff:

http://publications.icaria.de/mct/

• Thread at the Proxmark3 Forum:

http://www.proxmark.org/forum/viewtopic.php?id=1535

MIFARE® is a registered trademark of NXP Semiconductors.

What's New in the Latest Version 4.2.3

Last updated on Aug 31, 2024

Version 4.2.3:
* Make "cancel" during key map creation more responsive
(Thanks to Alan Le Corre).
* Added more well known keys to the extended key file.
(extended-std.keys file will be updated automatically.)
* Fixed several crashes.
* Some minor code cleanup.

Version 4.2.2:
* Fixed crash when opening the preferences using
Chinese language.

Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt

Translation Loading...

Additional APP Information

Latest Version

Request MIFARE Classic Tool Update 4.2.3

Uploaded by

Hoàng Thanh

Requires Android

Android 4.4+

Available on

Get MIFARE Classic Tool on Google Play

Show More

MIFARE Classic Tool Screenshots

Languages
Subscribe to APKPure
Be the first to get access to the early release, news, and guides of the best Android games and apps.
No thanks
Sign Up
Subscribed Successfully!
You're now subscribed to APKPure.
Subscribe to APKPure
Be the first to get access to the early release, news, and guides of the best Android games and apps.
No thanks
Sign Up
Success!
You're now subscribed to our newsletter.