Back to Top
MIFARE Classic Tool - MCT Screenshot 0
MIFARE Classic Tool - MCT Screenshot 1
MIFARE Classic Tool - MCT Screenshot 2
MIFARE Classic Tool - MCT Screenshot 3
Free website generator for mobile apps; privacy policy, app-ads.txt support and more... AppPage.net

About MIFARE Classic Tool - MCT

This is an Android NFC-App for reading, writing, analyzing, etc. MIFARE® Classic RFID-Tags.


GENERAL INFORMATION
This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
It is designed for users who have at least basic familiarity with the MIFARE Classic technology.


┏━┫ PLEASE READ ┣━
┃Please read the whole page and make sure you got everything right before rating. Thank you!
┃If you rate with less then 4 stars, please leave a comment why. This way I can improve this app.
┃If you like MCT please consider to buy the donate version.
┗━


FEATURES
• Read MIFARE Classic tags
• Save and edit the tag data you read
• Write to MIFARE Classic tags (block-wise)
• Clone MIFARE Classic tags
(Write dump of a tag to another tag; write 'dump-wise')
• Key management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.)
• Format a tag back to the factory/delivery state
• Write the manufacturer block of special MIFARE Classic tags
• Create, edit and save key files (dictionaries)
• Decode & Encode MIFARE Classic Value Blocks
• Decode & Encode MIFARE Classic Access Conditions
• Compare dumps (Diff Tool)
• Display generic tag information
• Display the tag data as highlighted hex
• Display the tag data as 7-Bit US-ASCII
• Display the MIFARE Classic Access Conditions as a table
• Display MIFARE Classic Value Blocks as integer
• In-App (offline) help and information
• It's open source (GPLv3) ;)


IMPORTANT NOTES
Some important things are:
• The features this tool provides are very basic. There are no such
fancy things like saving a URL to an RFID-Tag with a nice looking
graphical user interface. If you want so save things on a tag,
you have to input the raw hexadecimal data.
• This App can NOT crack/hack
any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
need keys for this specific tag first. For additional information
please read/see Getting Started from the links section.
• There will be no "brute-force" attack
capability in this application. It is way too slow due
to the protocol.
• The first block of the first sector of an original
MIFARE Classic tag is read-only i.e. not writable. But there
are special MIFARE Classic tags that support writing to the
manufacturer block with a simple write command. This App is able to
write to such tags and can therefore create fully correct clones.
However, some special tags require a special command sequence
to put them into the state where writing to the manufacturer block is possible.
These tags will not work.
Remember this when you are shopping for special tags!
• This app will NOT work on some devices because
their hardware (NFC-controller) does not support MIFARE Classic
( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
You can find a list of unsupported devices here:
https://github.com/ikarus23/MifareClassicTool#general-information


LINKS
• Project Page on github:
https://github.com/ikarus23/MifareClassicTool
• MIFARE Classic Tool on F-Droid:
https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
• Getting started & other help:
https://github.com/ikarus23/MifareClassicTool#getting-started
• Bug tracker:
IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE
https://github.com/ikarus23/MifareClassicTool/issues
• Additional stuff:
http://publications.icaria.de/mct/
• Thread at the Proxmark3 Forum:
http://www.proxmark.org/forum/viewtopic.php?id=1535


MIFARE® is a registered trademark of NXP Semiconductors.

Similar Apps

MIFARE Classic Tool

MIFARE Classic Tool

4.6

This is a low-level tool for reading, writing and analyzing MIFARE® Classic...

MIFARE Classic Tool - Donate

MIFARE Classic Tool - Donate

5.0

This is exactly the same version of MIFARE Classic Tool (MCT) as...

Frequently Asked Questions(FAQ)

What is MIFARE Classic Tool - MCT?

MIFARE Classic Tool - MCT is an Android NFC-App for reading, writing, analyzing, etc. MIFARE Classic RFID-Tags.

What features does MIFARE Classic Tool - MCT provide?

MIFARE Classic Tool - MCT provides features such as reading MIFARE Classic tags, saving and editing tag data, writing to MIFARE Classic tags, cloning MIFARE Classic tags, key management based on dictionary-attack, formatting a tag back to the factory/delivery state, writing the manufacturer block of special MIFARE Classic tags, creating, editing, and saving key files (dictionaries), decoding and encoding MIFARE Classic Value Blocks and Access Conditions, comparing dumps (Diff Tool), displaying generic tag information and tag data in various formats, and providing in-app help and information.

Can MIFARE Classic Tool - MCT crack or hack MIFARE Classic keys?

No, MIFARE Classic Tool - MCT cannot crack or hack any MIFARE Classic keys. The tool requires keys for a specific tag in order to read or write the tag.

Can MIFARE Classic Tool - MCT perform "brute-force" attacks?

No, MIFARE Classic Tool - MCT does not have "brute-force" attack capability. It is not efficient due to the protocol.

Are there any limitations or special requirements for using MIFARE Classic Tool - MCT?

Yes, the first block of the first sector of an original MIFARE Classic tag is read-only and cannot be written. Some special MIFARE Classic tags require a special command sequence to enable writing to the manufacturer block, and not all tags will work with the app. Additionally, the tool may not work on certain devices that do not support MIFARE Classic.

Where can I find additional information or get support for MIFARE Classic Tool - MCT?

Additional information, project page on GitHub, MIFARE Classic Tool on F-Droid, getting started guide, bug tracker, additional resources, and a forum thread can be found on the respective links provided.
author
Works as described. Save me so many times when fob stopped working for some reason, cloned the original one in under 1 min. Thank you guys for this very useful app. Love from Australia
Sandeep Singh
author
Works well with mifare cards..writing or dumping. On own not able to write UID or block 0 unless magic cards but combined with RFID copier which copies UID to any writeable card, can clone mifare access cards
ron
author
Good
Catalin-Adrian Vladoi
author
Thank you for developer <3
Kmh_
author
Easy to use app however, How do I copy a 125khz RFID key fob my phone will not pick it up what's so ever.
Lewis Russell-Cheeseman
author
Great app, I cloned 13.56MHz tags without any problem. Well done!
Darko Drakulic