Skip to content

Instantly share code, notes, and snippets.

@synthetic-intelligence
Last active November 1, 2025 23:11
Show Gist options
  • Select an option

  • Save synthetic-intelligence/c151055232463f70ef6539812bcf4c65 to your computer and use it in GitHub Desktop.

Select an option

Save synthetic-intelligence/c151055232463f70ef6539812bcf4c65 to your computer and use it in GitHub Desktop.
ProxMark4 -cutting down their notes to most relevant

First rule of proxmarking read the datasheets

Second rule of proxmarking search the forum

Third rule of proxmarking learning is hard and takes time

now go and read the following

Readme

Official Proxmark3 wiki

Over at the offical Proxmark3 repo, in the wiki, there are some more interesting how to / cheat sheets that are easy to miss.

They are good starting points regardless.

Low Frequency (125-134kHz)

High Frequency (13.56MHz)

Great stuff

  • Look at oversampling the ADC to get 10bit resolution by removing quantization effects. Successful
  • Improve the LF signal demodulation.
  • [in progress] Add support for FeliCa.
  • Improve iClass key recovery with using device onboard flash memory.
  • [in progress] Improve LF HITAG2 code to use ADC path
  • Finish frame API transition to use SendCommandNG everywhere
  • [in progress] Chase compilation warnings, when aggressively enabled especially with clang, head-overflows, memory leaks,
  • External flash signature is using hardcoded RSA params, let's support PEM cert & key files with mbedtls
  • All HF 15 commands needs a redesign. They are not structured like the rest and e.g. hf 15 info u is leaving the HF field on
  • See if compressing raw LF samples would speed up BT communication
  • HF reader identification: listen to 14a/14b/15/iclass/... reader requests and show what reader supports in its polling sequence
  • Investigate if there is some gain moving more code from ARM to Thumb, slurdge started looking at it...
  • Support 14a anticollision to detect several tags
  • Forge collision in 14a simulation to simulate several tags at once
  • Support all iso14443a speeds (support also 212 kbit/s, 424 kbit/s, and 848 kbit/s in reader/sim/sniff modes)
  • [in progress] Support Mifare Desfire Light
  • [in progress] LIBPM3 - separate cli /gui from functions, in order to make a libary. This will help Webgui, gui, cli implementations.
  • Incorporate the amiibo tool into hf mfu commands nicely.
  • Implement wipe commands for cards. Like hf mf wipe hf mfu wipe hf 14b wipe hf 15 wipe hf felica wipe

Accomplished stuff

  • Have some testbed with a bunch of cards to semi-automate regression tests on most of the features
  • MAKE INSTALL - enable easyness for package installers / maintainers on pentoo / kali / nethunter to ship proxmark3 binaries
  • Fix reflashing with images > 256k. Current only way is with a JTAG programmer
  • Refactor fileutil out of loclass as it's used elsewhere as well
  • Add ECC signature verification to hf mfu info
  • "script run e" is broken on 64b platforms Reveng was broken on != WIN32, fixed.
  • Add support for Thinfilm NFC barcodes
  • Add a lf t55xx clone : read t55xx then program another t55xx
  • Implemented hf plot - from offical repo
  • Implemented hf mf staticnested
  • Implement HITAG2 known attacks
  • Makefile pimp-up to ease the choice of compiler and compilation flags
  • Looking getting the device to communicate with sim module in a standalone mode
  • Port HF FPGA improvements from the official repo to this repo
  • Implement tear-off (cutting abruptly power when an RFID is operating). Works on MFUL, needs to be generalized

Further hardware improvements

  • Long range antennas

RRG / Iceman Proxmark3

Home

Future

Roadmap
Wishlist

Standalone modes

Standalone mode

Blue shark

Blue Shark manual

JTAG Tools

Tools

Commands help

EMV
More cheat sheets

Signal processing

Learn about signals

Signal Processing and RF

This information came from the excellent wiki of BladeRF

Introduction

The most curious concept of Proxmark3 is the standalone mode functionalities.

With a battery power option, your device can enter a custom standalone function. You don't need a PC/Laptop with the Proxmark3 client software. The standalone mode is usually limited to a certain function, e.g. reading and then emulating a Legic Prime RFID tag. This also means the user interaction with the device is limited to the LEDs and the button.

LEDS BUTTONPRESS
4 leds (A,B,C,D) short, long or multiple (twice)

All standalone modes uses this differently and is hard to find out what is what. Looking at the source code might help.

To enter the currently flashed standalone mode, press and hold the button until the LEDs play a short animation.

Remember for all standalone modes that targets all Proxmark3 devices that they will loose of data on the device if you cut the power or drain the battery. This is a serious limit to all NON-RDV4 devices. Standalone modes that takes advantage of RDV4 specific features overcomes this limit.

implement your own

You can implement your own mode or you can use others already implemented modes. Have a look at https://github.com/RfidResearchGroup/proxmark3/blob/master/armsrc/Standalone/readme.md

Supported standalone modes

For any iceman based repo the current most popular public standalone modes is quite easy to compile and install. In this repo its even easier than before. The default standalone mode is HF_MSDSAL.

Table of built-in standalone modes:

STANDALONE DESCRIPTION AUTHOR DEVICE TARGET
LF_SKELETON Standalone mode skeleton Iceman1001 All
LF_EM4100EMUL Simulate predefined EM4100 tags Artyom Gnatyuk All
LF_EM4100RSWB Read/simulate/brute/clone EM4100 tags Monster1024 All
LF_EM4100RWC Read/simulate/clone EM4100 tags Artyom Gnatyuk All
LF_HIDBRUTE HID corporate 1000 bruteforce Federico dotta & Maurizio Agazzini All
LF_ICEHID LF HID / IOprox / AWID / EM4100 collector to flashmem Iceman1001 RDV4
LF_PROXBRUTE HID ProxII bruteforce Brad Antoniewicz All
LF_SAMYRUN HID26 read/clone/sim Samy Kamkar All
HF_14ASNIFF HF 14a sniff with to flashmem Michael Farrell RDV4
HF_AVEFUL MIFARE Ultralight read/simulation Ave Ozkal All
HF_BOG HF 14a sniff with ULC/ULEV1/NTAG auth to flashmem Bogito RDV4
HF_COLIN MIFARE ultra fast sniff/sim/clone to flashmem Colin Brigato RDV4
HF_ICECLASS iCLASS 4-1 mode sim/read & dump/loclass/glitch & config to flashmem Iceman1001 RDV4
HF_LEGIC Read/simulate Legic Prime tags (RDV4: + save to flashmem) Stefanie Hofmann & Uli Heilmeier All / RDV4 *
HF_MATTYRUN MIFARE sniff/clone Matías A. Ré Medina All
HF_MSDSAL (def) Read and emulate MSD Visa cards Salvador Mendoza All
HF_TCPRST IKEA Rothult ST25TA, Standalone Master Key Dump/Emulation Nick Draffen Yes
HF_YOUNG MIFARE sniff/simulation Craig Young Yes

* take notice, that some standalone modes takes advantage of RDV4 specific features which may or may not allow for a generic non-rdv4 device to use the mode. You will most likely read the source code to understand what is supported.

Activate/Change a standalone mode

The standalone modes can be switched in the file Makefile.platform. Only one standalone mode can be chosen at a time.

  • Rename Makefile.platform.sample -> Makefile.platform
  • Edit the "STANDALONE" row inside Makefile.platform. You need to uncomment it and chose a standalone mode.

A valid Makefile.platform could look like this:

PLATFORM=PM3RDV4
#PLATFORM_EXTRAS=BTADDON
STANDALONE=LF_EM4100RWC

After changing your standalone mode, don't forget to build and flash the code to the Proxmark3.

  • make clean
  • make -j
  • ./pm3-flash-fullimage

Additional information

Some community efforts has been done to document these.

@Hacker warehouse did a nice video on youtube.

Troy also has a nice image of the leds for LF SAMY_RUN.

A forum user detailed some modes.

The user @Tinker wrote a blogpost about badge cloning by Tinker.

Iceman, @herrmann1001, made a walkthru of the HF legic standalone mode and HF iceclass standalone mode.

The user @quentynblog made a nice video about the HF ST rothult standalone mode.

Development

If you want to write and implement your own standalone mode, the best starting point is to read and understand the readme document found here.

Blue Shark

Region

Jtag adapter

Proxgrind has created a neat little adapter which exposes the jtag pins which makes it simple procedure to flash.

Webshop: Adaptor on sneaktechnology.com

Font side

Proxmark3 Wishlist

for all of you who has an wish of a feature but you are lacking the will and interest to commit to contribute but the idea is a good one and we don't want to loose track of it. Then this list is for you.

You can edit and enter a line below. For discussions about your idea, we urge you to use the Proxmark3 forum. Start a thread and see if you can spark some interest!

Further ideas

  • MITM / Relay attacks using two Proxmark3
  • Emulate a smart card with sim module
  • Project Walrus support
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment