The Proxmark3 kit includes everything you need to get started doing RFID / NFC research in style. It has always been our mission to prevent DOA shipments and so all of our Proxmark gear is thoroughly tested in-house prior to shipping.
Inside the box you'll find an Enclosed Proxmark 3, LF Antenna, HF Antenna, EM4100, 1 HID 1326 ProxCard II, 1 T5577 tag, 1 Mifare 1K, 1 Mifare 4K, and 1 Mifare Ultralight, 2 antenna cables, and 1 power/communication cable. The Proxmark client software and firmware are open source and available for download. We offer pre-compiled versions that correspond to the current version in use on the board (see the links tab).
The Proxmark is the only SDR targeting NFC and RFID frequencies that is capable of both transmitting and receiving while meeting the timing requirements of most proximity protocols. The Proxmark also provides full control over the radio layer in addition to software support for several higher-level protocols (ex. Mifare).
The LF Antenna enables communication with tags that operate at 125kHz and 134kHz (including HID Prox II, HITAG, and EM4100). The HF Antenna enables communication with tags operating at 13.56Mhz (including Mifare Classic/Ultralight, and iClass).
The Proxmark has proven itself to be an invaluable tool within the research community. Here are some examples of how the Proxmark has been used to perform research:
Rysc Corp. pioneered the first commercial Proxmark offering back in 2008. Prior to that point, obtaining a Proxmark meant building one yourself. Since that first commercial offering we have continued developing the device and have assisted thousands of individuals and companies, large and small.
The Proxmark also makes a great educational tool. The entire platform (including hardware and software) is open source and can be readily analyzed and inspected. The Proxmark includes many of the major components found in a general purpose SDR but is simpler and therefore easier to understand. Faculty members should contact us about educational discounts if interested in incorporating the Proxmark into a course of study.
Naked Proxmark3, Enclosed Proxmark3, LF and HF Antenna can be purchased separately. Please email email@example.com for more information.
WARNING: The Proxmark3 is a research and development tool. It has not been evaluated for compliance with regulations governing transmission and reception of radio signals. You are responsible for using this product in compliance with your local laws.
In The Box: Enclosed Proxmark, LF Antenna, HF Antenna, 1 HF Tag Bundle, 1 LF Tag Bundle, All Required Cables
HF Tag Bundle: 1x Mifare 1K, 1x Mifare 4k, and 1x Mifare Ultralight Tags
LF Tag Bundle: EM4100, 1x HID 1326 ProxCard II, 1x T5577 Tags
Tested With: Windows XP, Windows 7, Windows 8, Windows 10, Linux, MacOS
This kit includes the HackRF One, injection modled plastic enclosure, micro USB cable, and can include an ANT500 or ANT700 for getting started with SDR.
HackRF One from Great Scott Gadgets is a Software Defined Radio peripheral capable of transmission or reception of radio signals from 10 MHz to 6 GHz. Designed to enable test and development of modern and next generation radio technologies, HackRF One is an open source hardware platform that can be used as a USB peripheral or programmed for stand-alone operation.
10 MHz to 6 GHz operating frequency
up to 20 million samples per second
8-bit quadrature samples (8-bit I and 8-bit Q)
compatible with GNU Radio, SDR#, and more
software-configurable RX and TX gain and baseband filter
software-controlled antenna port power (50 mA at 3.3 V)
SMA female antenna connector
SMA female clock input and output for synchronization
convenient buttons for programming
internal pin headers for expansion
Hi-Speed USB 2.0
open source hardware
WARNING: HackRF One is test equipment for RF systems. It has not been tested for compliance with regulations governing transmission of radio signals. You are responsible for using your HackRF One legally.
In The Box: HackRF One PCB, Plastic Enclosure, micro USB cable, can include ANT500 or ANT700
The credit-card sized ChameleonMini Rev.G is a versatile tool for practical NFC and RFID security analysis, compliance and penetration tests, and various end-user applications. The freely programmable platform can create perfect clones of various existing commercial smartcards, including cryptographic functions and the Unique Identifier (UID). It can be employed to assess security aspects in RFID and NFC environments in different attack scenarios, such as replay or relay attacks, state restoration attacks, sniffing of NFC communication, or functional tests of RFID equipment. New firmware for the ChameleonMini can be comfortably uploaded via a USB bootloader. A convenient, human-readable command set allows to configure its behavior and update the settings and content of up to eight internally stored, virtualized contactless cards. During battery-powered stand-alone operation, the integrated buttons and LEDs enable user interaction and feedback.
The ChameleonMini firmware can be configured and uploaded via USB to emulate a passive NFC device (e.g. a contactless card), act as an active NFC device (e.g. an RFID reader), sniff the communication (i.e. monitor the bits on the RF interface), and log the communication (during emulation and sniffing). The ChameleonMini can be interfaced with standard terminal software, via the command line, or controlled by user-written scripts and applications. The modular firmware structure allows for easy expandability to other not yet supported cards and standards. Various functions and settings can be assigned to the buttons and LEDs. Card contents can be easily uploaded and downloaded via USB using X-MODEM.
Features of the ChameleonMini:
Firmware support for ISO14443A Codec (emulation and reader)
Firmware support for Mifare Classic 1K and 4K emulation (4 and 7-byte UID)
Firmware support for Mifare Ultralight emulation
Hardware support for ASK modulation (Both 10% and 100%) to cover almost any card standard available
Hardware support for ASK and BPSK load modulation using a subcarrier
Modular firmware structure allows for easy expandability of other cards and standards
Support for quick and reliable firmware update via Atmel DFU bootloader, thus programming hardware is required only once
Can be controlled using a fully documented AT-like command set via CDC using the LUFA USB stack
Up to eight virtualized cards with a size of up to 8 kB per card can be stored in the non-volatile memory of ChameleonMini
Card contents can be easily uploaded and downloaded by means of the command line and X-MODEM
UID of ISO14443A cards can be obtained easily in reader mode
ChameleonMini can be interfaced with standard terminal software as well as user written scripts and applications
In The Box: 1x ChameleonMini, 1x 3ft Micro USB Cable, 1x LIR2032 Lithium Battery
Dimensions: 111.0 mm (L) x 53.0 mm (W) x 5.8 mm (H)
Weight: 20 g
Operating Frequency: 13.56 MHz
Operating Distance: Up to 60 mm
Firmware: Available on Github (note that the ChameleonMini Rev.G is delivered with test firmware only)
The Wundertooth is a remix of the Ubertooth One by Great Scott Gadgets. Each Wundertooth is programmed, tested, and fully assembled prior to shipping. A quick comparison of the two devices is shown below.
The Wundetooth is an open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation.
2.4 GHz transmit and receive.
Transmit power and receive sensitivity comparable to a Class 1 Bluetooth device.
In-System Programming (ISP) serial connector.
Expansion connector: intended for inter-Ubertooth communication or other future uses.
Six indicator LEDs.
In addition to monitoring bluetooth communications, the Ubertooth One can also be used as a 2.4Ghz spectrum analyzer.
WARNING: The Wundertooth is test equipment for Bluetooth systems. It has not been tested for compliance with regulations governing transmission of radio signals. You are responsible for using your Ubertooth One legally.
In The Box: Wundertooth with Antenna and Enclosure
YARD Stick One is a sub-1 GHz wireless transceiver controlled directly from your computer. It uses the same radio circuit as the popular IM-Me. The radio functions that are possible by customizing IM-Me firmware are now at your fingertips when you attach YARD Stick One to a computer via USB. The YARD Stick One fits neatly inside our YARD Stick One Enclosure.
YARD Stick One (Yet Another Radio Dongle) comes with RfCat firmware installed, courtesy of atlas. RfCat allows you to control the wireless transceiver from an interactive Python shell or your own program running on your computer. YARD Stick One also has CC Bootloader installed, so you can upgrade RFCat or install your own firmware without any additional programming hardware.
Originally based on the ToorCon 14 Badge design, YARD Stick One has several featured not previously seen in CC1111 dongles:
SMA connector for external antennas such as ANT500
receive amplifier for improved sensitivity
transmit amplifier for higher output power
flat RF performance across the entire CC1111 operating frequency range (281-361 MHz, 378-481 MHz, 749-962 MHz)
low pass filter for elimination of harmonics when operating in the 800 and 900 MHz bands
antenna port power control for compatibility with antenna port accessories designed for HackRF One
GoodFET-compatible expansion and programming header
InputStick is a wireless USB receiver, compatible with Android and iOS devices. It allows your smartphone to become a wireless keyboard, mouse, multimedia and game controller. Applications can use InputStick to remotely control your PC: type, move mouse, etc. You can use InputStick to remotely control your PC: USB Remote, type passwords: KP2A plugin or use it in your application: InputStick API.
InputStick is detected as a generic USB keyboard and mouse. Bluetooth link is used to communicate with smartphone. See How does it work? and FAQ for details.
InputStick is compatible with wide range of hardware and operating systems, see: Compatibility for details.
InputStick is extremely easy to use, (see: Getting started): plug it into USB port and in a few seconds it's ready to go. You don't have to install any server software, custom drivers, configure network or root /"jailbreak" your phone. See: Why InputStick?
Last but not least, InputStick is very portable: you can easily carry it in your pocket or attach to a keyring. You can also use multiple InputStick devices: one at home and one at the office, or use separate one for each device (PC, laptop, console).
WARNING: You are responsible for using this product in compliance with your local laws.
In The Box: InputStick
Dimensions: 57mm x 19mm x 9cm
Wireless connectivity: Bluetooth 4.0
Approximate Range: up to 10m
Compatibility: Any USB host, any OS (*)
Requirements: Android 2.3 or higher / iPhone 4S or later, Bluetooth
Everything you need to test surge protection in one kit. The USB Killer is a CE Approved & FCC Approved testing device designed to test the surge protection circuitry of electronics to their limits - and beyond.
When plugged into a device, the USB Killer rapidly charges its capacitors from the USB power lines. When the device is charged, -200VDC is discharged over the data lines of the host device. This charge/discharge cycle is repeated many times per second, until the USB Killer is removed.
Simply put: used on unprotected equipment, the USB Killer instantly and permanently disables unprotected hardware.
Its compact size and flash-drive style housing makes it an important device in every pen-tester's toolkit.
WARNING: The USB Killer is not a toy. It is developed and sold as a testing device. You are responsible for using this product in compliance with your local laws.
USB KILL 3.0
The latest USB Killer 3.0 ESD Testing Device. Instantly disables electronic devices with USB ports.
Input voltage: 4.5 - 5.5 VDC
Output voltage: -215 VDC
Pulse Frequency: 4 - 8 times / second
Pulse current: ≥180A
CE & FCC Approved, allowing you to test in complete safety.
Shield your devices and test your USB Killer. 2-in-1 functionality: Shield your electronics from Power Surge Attacks, and test the USB Killer.
Protect: Shields up to 1000VDC Test: Test your USB Killer device with the output leads
ADAPTOR KIT 3.0
Specially developed, industrial grade USB Adaptors bypass Apple & USB-C authentication methods, allowing you to test against everything.
Adaptor Kit Contents:
Lightning Adaptor: Tested against iPhone 5 - 7
USB-C: Tested against USB-C Authentication
MicroUSB: Most common portable adaptor
Industry Hardened: Engineered to withstand +1000VDC attacks.
In The Box: USB Killer 3.0, Testing Shield, Adapter Kit 3.0