Timeline of Development

PN532Killer project is a whole new project on the Tag emulator and reader on the AD15N chip.

Beginning in December 2023, our team initiated the PN532Killer project, developing both hardware and software aspects. By early 2024, we had introduced significant functionalities and system upgrades. By April 2024, we made additional performance improvements.

2025
MIFARE Classic Key Recovery Tools

Released comprehensive MIFARE Classic key recovery tools with cryptographic core implementation (Crapto1). Supports both dictionary-based attacks and advanced algebraic recovery methods. Added platform-independent utilities for improved cross-platform compatibility on Windows, Linux, and macOS.

TCP and UDP Network Connection Support

Added support for TCP and UDP socket connections alongside existing USB serial. The UI now dynamically shows the active connection type (USB, TCP, or UDP). Improved data flow control with smart buffering and added wakeup delay sequences to prevent hardware

PN532 Tag Scanner and NDEF Support

Introduced a new Tag Scanner mode for efficient bulk tag ID collection. Added NTAG/MIFARE read functionality with NDEF parsing that can automatically open detected URIs in a browser. Integrated a dedicated debug mode for advanced troubleshooting of NFC communication.

Start NFC Relay research with PN532Killer

Since PN532Killer has unparalleled simulation performance, and even FDT is lower than the original card, we are trying to use 2 PN532Killers for NFC Relay Research to meet the testing requirements of different ISO14443A cards.

Dual-Carrier Mode Support on ISO15693

The latest PN532Killer firmware upgrade introduces dual-carrier mode support, delivering improved anti-interference capabilities and faster data transfer rates for advanced RFID applications. Perfect for complex environments and high-performance needs!

7B UID Mifare Classic 1K Support

The latest firmware has support the Mifare Classic 1K in both 4 Byte UID and 7 Byte UID type.

2024
Working on Staticnested Attack
BLE Extension Released

Starting to pack and ship the BLE Extension for PN532Killer.

CLI for PN532Killer

Starting the Command Line Tool by Python for PN532Killer.

PCB of BLE Ads-on is ready

PCB of BLE Ads-on is ready for testing and debugging.

Support Flash Firmware on the phone

Now MTools App supports DFU(Device Firmware Update) for PN532Killer. It’s super easy to upgrade to the latest firmware on the go.

PN532Killer Tools V1.0.0 for Windows

We’ve released the V1.0.0 version of PN532Killer Tools for Windows. The available features include Tag Emulator and Sniffer for Mifare Classic with Mfkey32v2 and Mfkey64.

Support Working Mode

The working mode of PN532Killer can be set to Reader Mode, Emulator Mode, and Sniffer Mode by UART commands. It can be configured even if you don’t use the LCD extension for changing the settings. [video width=”2322″ height=”1630″ mp4=”https://pn532killer.com/wp-content/uploads/sites/2/2024/05/Control-PN532Killer-on-MTools.mp4″ loop=”true”

ISO15693 Reading Writing & Emulating

The latest firmware of PN532Killer can read and write the ISO15693 Tag.

Add support to MTools App

Compatible with Android App Customize PN532Killer interface name Optimize libnfc communication Speed up 20% – 30% on writing sectors Time cost of writing 16 sectors PN532: 1272 ms PN532Killer: 913ms The average speed of PN532Killer is about 20-30% faster than

Decoding Parameters Adjustment

To improve performance, we have adjusted the decoding parameters to increase the read/write distance and reduce the bit error rate.