What's newtag icon
Our latest AI innovations will deliver tomorrow's market todayDiscover howbanner icon

MIFARE Classic Tool análises de aplicativos para 3 de dezembro

MIFARE Classic Tool

MIFARE Classic Tool

  • IKARUS Projects
  • Google Play Store
  • Gratuitos
  • Ferramentas
This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags. GENERAL INFORMATION This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags. It is designed for users who have at least basic familiarity with the MIFARE Classic technology. Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version. My dump/key files are gone after updating MCT! No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326 FEATURES • Read MIFARE Classic tags • Save and edit the tag data you read • Write to MIFARE Classic tags (block-wise) • Clone MIFARE Classic tags (Write dump of a tag to another tag; write 'dump-wise') • Key management based on dictionary-attack (Write the keys you know in a file (dictionary). MCT will try to authenticate with these keys against all sectors and read as much as possible.) • Format a tag back to the factory/delivery state • Write the manufacturer block of special MIFARE Classic tags • Create, edit and save key files (dictionaries) • Decode & Encode MIFARE Classic Value Blocks • Decode & Encode MIFARE Classic Access Conditions • Compare dumps (Diff Tool) • Display generic tag information • Display the tag data as highlighted hex • Display the tag data as 7-Bit US-ASCII • Display the MIFARE Classic Access Conditions as a table • Display MIFARE Classic Value Blocks as integer • Calcualate the BCC • Quick UID clone feature • Import/export to common file types • In-App (offline) help and information • It's open source (GPLv3) ;) IMPORTANT NOTES Some important things are: • The features this tool provides are very basic. There are no such fancy things like saving a URL to an RFID-Tag with a nice looking graphical user interface. If you want so save things on a tag, you have to input the raw hexadecimal data. • This App can NOT crack/hack any MIFARE Classic keys. If you want to read/write an RFID-Tag, you need keys for this specific tag first. For additional information please read/see Getting Started from the links section. • There will be no "brute-force" attack capability in this application. It is way too slow due to the protocol. • The first block of the first sector of an original MIFARE Classic tag is read-only i.e. not writable. But there are special MIFARE Classic tags (aka magic tag gen2) that support writing to the manufacturer block with a simple write command. This App is able to write to such tags and can therefore create fully correct clones. However, some special tags require a special command sequence to put them into the state where writing to the manufacturer block is possible. These tags will not work. Remember this when you are shopping for special tags! • This app will NOT work on some devices because their hardware (NFC-controller) does not support MIFARE Classic ( https://github.com/ikarus23/MifareClassicTool/issues/1 ). You can find a list of unsupported devices here: https://github.com/ikarus23/MifareClassicTool#general-information LINKS • Project Page on github: https://github.com/ikarus23/MifareClassicTool • MIFARE Classic Tool on F-Droid: https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool • Getting started & other help: https://github.com/ikarus23/MifareClassicTool#getting-started • Bug tracker: IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE https://github.com/ikarus23/MifareClassicTool/issues • Additional stuff: http://publications.icaria.de/mct/ • Thread at the Proxmark3 Forum: http://www.proxmark.org/forum/viewtopic.php?id=1535 MIFARE® is a registered trademark of NXP Semiconductors.
MIFARE Classic Tool

MIFARE Classic Tool classificação de uso

A classificação de uso é baseada no algoritmo da Similarweb que calcula as instalações atuais e os usuários ativos ao longo de um período de 28 dias.

Todas as categorias em
Estados Unidos--
Ferramentas em
Estados Unidos#2,855

Usuários ativos diariamente

Analise os padrões de uso dos usuários de MIFARE Classic Tool visualizando os downloads de MIFARE Classic Tool e os usuários ativos diários ao longo do tempo.

Usuários

Analise os padrões de uso dos usuários de MIFARE Classic Tool visualizando os downloads de MIFARE Classic Tool e os usuários ativos diários ao longo do tempo.

Unlock daily active users
out.nov.3ez.

MIFARE Classic Tool Estatísticas de classificação ao longo do tempo

"Ranking de Uso do Similarweb e Ranking de Google Play Store para MIFARE Classic Tool

Ranking de Uso

Classificação

MIFARE Classic Tool Classificação por país

Países nos quais MIFARE Classic Tool tem a classificação mais alta em suas principais categorias


Interesses dos Usuários e Principais Categorias

Principais categorias e aplicativos usados pelos usuários do MIFARE Classic Tool

Principais Categorias
Afinidade
Principais Aplicativos Dentro da Categoria
Mais aplicativos
24%
Google Play services
NFC Tools
MTools BLE - BLE RFID Reader
Arduino IoT Cloud Remote
Phone by Google
11%
Google Wallet
Cash App
Coinbase: Buy BTC, ETH, SOL
PayPal - Pay, Send, Save
Venmo
8%
Priceline: Hotel, Flight & Car
Google Maps
Lime - #RideGreen
SmarTrip
Skyscanner Flights Hotels Cars
8%
Contacts
Google Messages
Messenger
Discord - Talk, Play, Hang Out
Gmail

Principais concorrentes e aplicativos alternativos

Aplicativos com alta probabilidade de serem usados pelos mesmos usuários, da mesma loja.

NFC Tools

NFC Tools

wakdev

CamCard-AI Scanner, Transcribe

CamCard-AI Scanner, Transcribe

INTSIG

One Pass™

One Pass™

Pear Health Labs

Keyguard

Keyguard

Artem Chepurnyi

MIFARE Classic Tool VS.

3ezembro d, 2025