I sourced mine for a reasonable price from an RFID tech-friend (he used ). The attack is based off the collection of two cryptographic handshakes (based off the Mifare UID) we can then use the crypto1 algorithm to discover one key used to access the particular Mifare sector other attacks can then be performed to access and clone an entire card.
The program has two modes read & write, these operations are detailed below… Note: From Windows 7+ Microsoft changed the way smartcard drivers operate, and I havnt figured out how to support the later versions of Windows. This program has been tested successfully on the USB ACR-122U reader on the following operating systems: This is a simple English (or American) Language program to facilitate non-Chinese users, and released as Open Source so that the content can be analysed and confirmed to be true to purpose and non-malicious if you do not trust it? Many super-card card programs are either broken / wrong type / or written in Chinese. The program below is an interface to the Mifare Super (Suppa/Supper) Card utilising the libnfc 1.7.1 library (probably now outdated as this program was written in early 2014).
Alternatively called Proxmark-Card, Sniffer-Card, or Suppa Card