Ingen beskrivning

wuhanstudio d20d9a5cbd [nfc_perror] goto error 4 år sedan
LICENSE 372a769749 Create LICENSE 4 år sedan
README.md afc3d8fd4a Create README.md 4 år sedan
SConscript 5a5e7a7a15 Initial Commit 4 år sedan
config.h 5a5e7a7a15 Initial Commit 4 år sedan
crapto1.c 5a5e7a7a15 Initial Commit 4 år sedan
crapto1.h 5a5e7a7a15 Initial Commit 4 år sedan
crypto1.c 5a5e7a7a15 Initial Commit 4 år sedan
mfoc.c d20d9a5cbd [nfc_perror] goto error 4 år sedan
mfoc.h 5a5e7a7a15 Initial Commit 4 år sedan
mifare.c 5a5e7a7a15 Initial Commit 4 år sedan
mifare.h 5a5e7a7a15 Initial Commit 4 år sedan
nfc-utils.c 5a5e7a7a15 Initial Commit 4 år sedan
nfc-utils.h 5a5e7a7a15 Initial Commit 4 år sedan
slre.c 5a5e7a7a15 Initial Commit 4 år sedan
slre.h 5a5e7a7a15 Initial Commit 4 år sedan

README.md

mfoc

Mifare Classic Offline Cracker on RT-Thread

MFOC is an open source implementation of "offline nested" attack by Nethemba.

https://github.com/nfc-tools/mfoc

This program allow to recover authentication keys from MIFARE Classic card.

Please note MFOC is able to recover keys from target only if it have a known key: default one (hardcoded in MFOC) or custom one (user provided using command line).