๐Ÿท๏ธ NullSec RFID

March 7, 2026 ยท View on GitHub

๐Ÿท๏ธ NullSec RFID

RFID & NFC Security Analysis Toolkit

Python C License NullSec

RFID/NFC card analysis, cloning, emulation, and access control security testing


๐ŸŽฏ Overview

NullSec RFID provides comprehensive tools for testing RFID and NFC-based access control systems. From low-frequency proximity cards to high-frequency smart cards, it covers the full spectrum of contactless security research.

โšก Features

FeatureDescription
Card ReaderRead and dump data from 125 kHz and 13.56 MHz cards
Card ClonerClone EM4100, HID ProxII, Indala, and Mifare cards
Key CrackerMifare Classic nested/darkside/hardnested attacks
NFC EmulatorEmulate cards for replay and relay testing
NDEF ParserParse and craft NFC Data Exchange Format messages
Access AuditorTest physical access control configurations

๐Ÿ”ง Supported Cards

Card TypeFrequencyReadCloneCrack
EM4100125 kHzโœ…โœ…N/A
HID ProxII125 kHzโœ…โœ…N/A
Indala125 kHzโœ…โœ…N/A
Mifare Classic 1K/4K13.56 MHzโœ…โœ…โœ…
Mifare Ultralight13.56 MHzโœ…โœ…N/A
Mifare DESFire13.56 MHzโœ…โš ๏ธโš ๏ธ
NTAG 213/215/21613.56 MHzโœ…โœ…N/A
iCLASS13.56 MHzโœ…โš ๏ธโš ๏ธ

๐Ÿš€ Quick Start

# Scan for nearby cards
nullsec-rfid scan

# Read a Mifare Classic card
nullsec-rfid read --type mifare -o card_dump.json

# Run key recovery attack
nullsec-rfid crack --method hardnested --known-key FFFFFFFFFFFF

# Clone card to blank
nullsec-rfid clone --source card_dump.json --target T55x7

# Parse NFC NDEF data
nullsec-rfid ndef --parse tag_data.bin
ProjectDescription
nullsec-sdrSoftware-defined radio toolkit
nullsec-glitchVoltage glitching attacks
nullsec-flipper-suiteFlipper Zero payloads (430+ files)
nullsec-linuxSecurity Linux distro (140+ tools)

For authorized security testing only. Cloning access cards without authorization is illegal.

๐Ÿ“œ License

MIT License โ€” @bad-antics


Part of the NullSec Hardware Security Suite