What is PN532Killer?

PN532Killer is a PN532 emulator and it comes with faster emulation and higher processing speed. It supports operating the tag in ISO14443A type which includes Mifare Classic, Mifare Ultralight, and NTAG, also ISO15693 which includes iCode. Besides, it also supports sniffing the communication of ISO14443A and ISO15693.

PN532Killer – ISO15693 ISO14443 EM4100

PN532Killer Key Features

Advanced Reader

It is compatible with PN532 software and supports more features.

Tag Emulator

The fastest ISO14443A – MIFARE and ISO15693 – iCode tag emulation.

NFC Sniffer

Sniff communication for both MIFARE Classic and ISO15693 Protocol.

Standalone Mode

Support standard alone working mode. Enjoy RFID on the go.

Connection

Support connections with both USB and Bluetooth 4.2 for all platforms.

Extensions

Support extended with LF antenna, screen, or Bluetooth module

Frequently Asked Questions

What can PN532Killer do?
  1. Emulation as a PN532 chip for open sources libraries supported.
  2. Standard card reader for all platforms supports
  3. Sniffing communications from original tags
What kind of tags do PN532Killer can emulate?
  1. ISO14443A Tag
    • Mifare Classic 1K
    • Mifare Ultralight
  2. ISO15693 Tag
    • ICode
Why do we start PN532Killer?

The performance of PN532 with nested attack performance worst. And the NFC emulator on the market has bad performance on Frame Delay Time.

What is Frame Delay Time?

“Frame Delay Time” plays a crucial role in emulation; inferior performance can result in non-compliance with protocol specifications, potential data loss, and ultimately lead to emulation failure.

PN532Killer has the fatest FDT which is even faster than the orignal tags. And it’s 4 times faster than the Chameleon Ultra.

How can PN532Killer recover keys?
  1. Nested attack
  2. Hardnested – 2x speed of collecting nonce than PN532
  3. mfkey32v2 – Sniffing without original tag
  4. mfkey64 – Sniffing with original tag
  5. Darkside – coming soon
  6. StaticNested – coming soon
  7. Relay attack – coming soon

CLI for PN532Killer / PN532

https://github.com/whywilson/pn532-python

Working on Staticnested Attack
BLE Extension Released

Starting to pack and ship the BLE Extension for PN532Killer.

CLI for PN532Killer

Starting the Command Line Tool by Python for PN532Killer.

PCB of BLE Ads-on is ready

PCB of BLE Ads-on is ready for testing and debugging.

Support Flash Firmware on the phone

Now MTools App supports DFU(Device Firmware Update) for PN532Killer. It’s super easy to upgrade to the latest firmware on the

PN532Killer Tools V1.0.0 for Windows

We’ve released the V1.0.0 version of PN532Killer Tools for Windows. The available features include Tag Emulator and Sniffer for Mifare

Customer Reviews