Skip to content

Releases: whywilson/pn532-python

PN532 CLI - beta.7a9b1f26

23 Dec 10:50
b3225c4

Choose a tag to compare

Pre-release

🛠 Firmware & CLI Enhancements (Dec 2025)

  • Firmware Upgrade: Added support for PN532Killer firmware upgrades directly through the CLI.
  • Hardware Control: Implemented hardware version echo functionality and manual LED control.

🔑 MIFARE Classic Key Recovery (Nov - Dec 2025)

  • Key Recovery Tools: Developed mfkey32v2 and mfkey64 for recovering keys from MIFARE Classic cards.
  • Cryptographic Core: Implemented crypto1.c and parity.h for specialized cryptographic operations.
  • System Utilities: Added platform-independent sleep functions and POSIX utility helpers for improved cross-platform compatibility.

🌐 Connectivity & Data Optimization (Aug 2025)

  • Network Protocols: Introduced support for TCP and UDP connections, including dynamic UI labels to identify the connection type (USB, TCP, or UDP).
  • Communication Stability: Improved data flow control and added a specific delay for PN532 wakeup sequences to prevent hardware communication errors.
  • Data Helpers: Added processing helper functions to handle various input data types more flexibly.

🏷 Tag Support & Emulation (June - Aug 2025)

  • Gen3 Tag Support: Fixed 7-byte UID support for Gen3 tags and corrected related parameter checks.
  • Emulator Enhancements: Added MFU (MIFARE Ultralight) support for hardware-mode emulators and added the hf mfu eRead command to read data from the PN532Killer emulator.
  • Data Export: Supported exporting MFU dumps from slots to both JSON and BIN formats.

🔍 Scanning & NDEF Functionality (Mar - May 2025)

  • Tag Scanner: Introduced a new PN532 Tag Scanner feature.
  • NTAG & NDEF: Added NTAG read functionality that parses NDEF data and can automatically open detected URIs in a web browser.
  • Debug Mode: Integrated a dedicated debug command and updated the README with detailed debug mode instructions.

PN523 CLI v1.0.1

04 Jun 01:37
b7a338a

Choose a tag to compare

PN532 CLI

Supported Devices

  1. PN532
  2. PN532Killer

hf mf commands

  • eload Load Mifare Dump to PN532Killer Slot
  • eread Get Mifare Classic dump from PN532Killer Slot
  • setuid Set UID of magic Mifare classic with UID or block0 on Gen1a, Gen2, Gen3 and Gen4 UMC.
  • rdbl Please enter correct parameters
  • wrbl Please enter correct parameters
  • cview View Gen1a dump
  • dump Dump Mifare Classic card
  • wipe Wipe Mifare Classic card

hf mfu commands

  • rdbl Read Mifare Ultralight block
  • wrbl Write Mifare Ultralight block
  • dump Dump Mifare Ultralight card
  • setuid Set UID of DirectWrite Mifare Ultralight Tag

hf 14a commands

  • scan Scan 14a tag, and print basic information
  • raw Send iso1444a raw command
  • gen4pwd Brute force Gen4 password

hf 15 commands (PN532Killer)

  • scan Scan ISO15693 tag, and print basic information
  • info Get ISO15693 tag information
  • rdbl Read block data from ISO15693 tag
  • wrbl Write block data to ISO15693 tag
  • raw Send iso15693 raw command
  • gen1uid Set UID of Gen1 Magic ISO15693 tag
  • gen2uid Set UID of Gen2 Magic ISO15693 tag
  • gen2config Set block size of Gen2 Magic ISO15693 tag
  • esetuid Set UID of ISO15693 Emulation
  • esetblock Set block data of ISO15693 Emulation
  • eSetwriteprotect Set write protect of ISO15693 Emulation
  • eSetResvEasAfiDsfid Set Resv, EAS, AFI, DSFID of ISO15693 Emulation

lf commands (PN532Killer)

  • em { EM commands... }
  • scan Scan LF tag, and print basic information

hw mode(PN532Killer)

  • r Set device to reader mode
  • e Set device to emulator mode
  • s Set device to sniffer mode

ntag emulate (PN532)

Emulate with NDEF data such as Url, phone number, email address.

What's Changed

Full Changelog: v1.0.0...v1.0.1