Timeline of Development
PN532Killer project is a whole new project on the Tag emulator and reader on the AD15N chip.
Beginning in December 2023, our team initiated the PN532Killer project, developing both hardware and software aspects. By early 2024, we had introduced significant functionalities and system upgrades. By April 2024, we made additional performance improvements.
Released comprehensive MIFARE Classic key recovery tools with cryptographic core implementation (Crapto1). Supports both dictionary-based attacks and advanced algebraic recovery methods. Added platform-independent utilities for improved cross-platform compatibility on Windows, Linux, and macOS.
Added support for TCP and UDP socket connections alongside existing USB serial. The UI now dynamically shows the active connection type (USB, TCP, or UDP). Improved data flow control with smart buffering and added wakeup delay sequences to prevent hardware
Introduced a new Tag Scanner mode for efficient bulk tag ID collection. Added NTAG/MIFARE read functionality with NDEF parsing that can automatically open detected URIs in a browser. Integrated a dedicated debug mode for advanced troubleshooting of NFC communication.
Since PN532Killer has unparalleled simulation performance, and even FDT is lower than the original card, we are trying to use 2 PN532Killers for NFC Relay Research to meet the testing requirements of different ISO14443A cards.
The latest PN532Killer firmware upgrade introduces dual-carrier mode support, delivering improved anti-interference capabilities and faster data transfer rates for advanced RFID applications. Perfect for complex environments and high-performance needs!
The latest firmware has support the Mifare Classic 1K in both 4 Byte UID and 7 Byte UID type.
Starting to pack and ship the BLE Extension for PN532Killer.
Starting the Command Line Tool by Python for PN532Killer.
PCB of BLE Ads-on is ready for testing and debugging.
Now MTools App supports DFU(Device Firmware Update) for PN532Killer. It’s super easy to upgrade to the latest firmware on the go.
We’ve released the V1.0.0 version of PN532Killer Tools for Windows. The available features include Tag Emulator and Sniffer for Mifare Classic with Mfkey32v2 and Mfkey64.
The working mode of PN532Killer can be set to Reader Mode, Emulator Mode, and Sniffer Mode by UART commands. It can be configured even if you don’t use the LCD extension for changing the settings. [video width=”2322″ height=”1630″ mp4=”https://pn532killer.com/wp-content/uploads/sites/2/2024/05/Control-PN532Killer-on-MTools.mp4″ loop=”true”
The latest firmware of PN532Killer can read and write the ISO15693 Tag.
Compatible with Android App Customize PN532Killer interface name Optimize libnfc communication Speed up 20% – 30% on writing sectors Time cost of writing 16 sectors PN532: 1272 ms PN532Killer: 913ms The average speed of PN532Killer is about 20-30% faster than
To improve performance, we have adjusted the decoding parameters to increase the read/write distance and reduce the bit error rate.