Нет описания

wuhanstudio d20d9a5cbd [nfc_perror] goto error 4 лет назад
LICENSE 372a769749 Create LICENSE 4 лет назад
README.md afc3d8fd4a Create README.md 4 лет назад
SConscript 5a5e7a7a15 Initial Commit 4 лет назад
config.h 5a5e7a7a15 Initial Commit 4 лет назад
crapto1.c 5a5e7a7a15 Initial Commit 4 лет назад
crapto1.h 5a5e7a7a15 Initial Commit 4 лет назад
crypto1.c 5a5e7a7a15 Initial Commit 4 лет назад
mfoc.c d20d9a5cbd [nfc_perror] goto error 4 лет назад
mfoc.h 5a5e7a7a15 Initial Commit 4 лет назад
mifare.c 5a5e7a7a15 Initial Commit 4 лет назад
mifare.h 5a5e7a7a15 Initial Commit 4 лет назад
nfc-utils.c 5a5e7a7a15 Initial Commit 4 лет назад
nfc-utils.h 5a5e7a7a15 Initial Commit 4 лет назад
slre.c 5a5e7a7a15 Initial Commit 4 лет назад
slre.h 5a5e7a7a15 Initial Commit 4 лет назад

README.md

mfoc

Mifare Classic Offline Cracker on RT-Thread

MFOC is an open source implementation of "offline nested" attack by Nethemba.

https://github.com/nfc-tools/mfoc

This program allow to recover authentication keys from MIFARE Classic card.

Please note MFOC is able to recover keys from target only if it have a known key: default one (hardcoded in MFOC) or custom one (user provided using command line).