RFID/NFC card analysis, cloning, emulation, and access control security testing
NullSec RFID provides comprehensive tools for testing RFID and NFC-based access control systems. From low-frequency proximity cards to high-frequency smart cards, it covers the full spectrum of contactless security research.
| Feature | Description |
|---|---|
| Card Reader | Read and dump data from 125 kHz and 13.56 MHz cards |
| Card Cloner | Clone EM4100, HID ProxII, Indala, and Mifare cards |
| Key Cracker | Mifare Classic nested/darkside/hardnested attacks |
| NFC Emulator | Emulate cards for replay and relay testing |
| NDEF Parser | Parse and craft NFC Data Exchange Format messages |
| Access Auditor | Test physical access control configurations |
| Card Type | Frequency | Read | Clone | Crack |
|---|---|---|---|---|
| EM4100 | 125 kHz | ✅ | ✅ | N/A |
| HID ProxII | 125 kHz | ✅ | ✅ | N/A |
| Indala | 125 kHz | ✅ | ✅ | N/A |
| Mifare Classic 1K/4K | 13.56 MHz | ✅ | ✅ | ✅ |
| Mifare Ultralight | 13.56 MHz | ✅ | ✅ | N/A |
| Mifare DESFire | 13.56 MHz | ✅ | ||
| NTAG 213/215/216 | 13.56 MHz | ✅ | ✅ | N/A |
| iCLASS | 13.56 MHz | ✅ |
# Scan for nearby cards
nullsec-rfid scan
# Read a Mifare Classic card
nullsec-rfid read --type mifare -o card_dump.json
# Run key recovery attack
nullsec-rfid crack --method hardnested --known-key FFFFFFFFFFFF
# Clone card to blank
nullsec-rfid clone --source card_dump.json --target T55x7
# Parse NFC NDEF data
nullsec-rfid ndef --parse tag_data.bin| Project | Description |
|---|---|
| nullsec-sdr | Software-defined radio toolkit |
| nullsec-glitch | Voltage glitching attacks |
| nullsec-flipper-suite | Flipper Zero payloads (430+ files) |
| nullsec-linux | Security Linux distro (140+ tools) |
For authorized security testing only. Cloning access cards without authorization is illegal.
MIT License — @bad-antics
Part of the NullSec Hardware Security Suite