MIFARE Classic Tool

2.28K reviews
Content rating
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.

This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.

My dump/key files are gone after updating MCT!
No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326

• Read MIFARE Classic tags
• Save and edit the tag data you read
• Write to MIFARE Classic tags (block-wise)
• Clone MIFARE Classic tags
(Write dump of a tag to another tag; write 'dump-wise')
• Key management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.)
• Format a tag back to the factory/delivery state
• Write the manufacturer block of special MIFARE Classic tags
• Create, edit and save key files (dictionaries)
• Decode & Encode MIFARE Classic Value Blocks
• Decode & Encode MIFARE Classic Access Conditions
• Compare dumps (Diff Tool)
• Display generic tag information
• Display the tag data as highlighted hex
• Display the tag data as 7-Bit US-ASCII
• Display the MIFARE Classic Access Conditions as a table
• Display MIFARE Classic Value Blocks as integer
• Calcualate the BCC
• Quick UID clone feature
• Import/export to common file types
• In-App (offline) help and information
• It's open source (GPLv3) ;)

Some important things are:
• The features this tool provides are very basic. There are no such
fancy things like saving a URL to an RFID-Tag with a nice looking
graphical user interface. If you want so save things on a tag,
you have to input the raw hexadecimal data.
• This App can NOT crack/hack
any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
need keys for this specific tag first. For additional information
please read/see Getting Started from the links section.
• There will be no "brute-force" attack
capability in this application. It is way too slow due
to the protocol.
• The first block of the first sector of an original
MIFARE Classic tag is read-only i.e. not writable. But there
are special MIFARE Classic tags (aka magic tag gen2) that
support writing to the manufacturer block with a simple write command.
This App is able to write to such tags and can therefore create fully
correct clones. However, some special tags require a special command
to put them into the state where writing to the manufacturer
block is possible.
These tags will not work.
Remember this when you are shopping for special tags!
• This app will NOT work on some devices because
their hardware (NFC-controller) does not support MIFARE Classic
( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
You can find a list of unsupported devices here:

• Project Page on github:
• MIFARE Classic Tool on F-Droid:
• Getting started & other help:
• Bug tracker:
• Additional stuff:
• Thread at the Proxmark3 Forum:

MIFARE® is a registered trademark of NXP Semiconductors.
Updated on
Feb 3, 2024

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection

Ratings and reviews

2.24K reviews
May 21, 2024
Sadly doesnt seem to be writing anything to cards, does read them. Might need blank card? edit: did research and bought gen2 card, works well!
1 person found this review helpful
Did you find this helpful?
IKARUS Projects
January 3, 2024
It should be possible to write to a card, as long as you have the keys with write permissions. Have a look at the "access conditions" and try the latest version 4.2.0.
Ryan Suedel (Icatchem925)
March 6, 2021
Had for a while and worked fine. Then all of a sudden it started opening by itself after every text I made. Wonder if it was taken over by a virus or something. Uninstalled. Response to developer's question: No NFC tags were near phone or in case. Opened by itself when I intentionally opened Chrome app. Then kept opening every few seconds, even after phone restart.
43 people found this review helpful
Did you find this helpful?
IKARUS Projects
March 3, 2021
?!? Do you have a NFC tag close to your phone? Maybe in cover? MCT does automatically start, if a Tag was detected.
Anderson Steinitz
June 21, 2021
It has an error, when I enter the passwords that there are and it dumps me and I save it. when doing it to another card with other keys you do not do it. If I try to analyze the first card with its keys again, now it does not recognize them and does not dump. desistalo and install and follows the same error, days after removing it install it and it works only once
27 people found this review helpful
Did you find this helpful?

What's new

Version 4.2.2:
* Fixed crash when opening the preferences using
Chinese language.

Version 4.2.1:
* Added Russian translation (Thanks to "IIIef").
* Added Portuguese translation (Thanks to "YaBa").
* Fixed crash on Samsung Galaxy S24 Ultra
(Thanks to Eduardo Speroni).
* Fixed some crashes related to Android 14.

Full changelog: https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/CHANGELOG.txt