Skip to content

0rx1/Mifarelay

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MIFA-RELAY

  1. To reproduce the attack you simply run pm3server.py to launch a local http server for capturing and saving the UIDs Received.
  2. Run capture.py to prepare your proxmark3 to detect near cards & dump the UID
  3. While the data in being captured now you can run the final script sim.py to pick which captured card you want to simulate via the second proxmark3

Happy Hacking