Releases: whywilson/pn532-python
Releases · whywilson/pn532-python
PN532 CLI - beta.7a9b1f26
🛠 Firmware & CLI Enhancements (Dec 2025)
- Firmware Upgrade: Added support for PN532Killer firmware upgrades directly through the CLI.
- Hardware Control: Implemented hardware version echo functionality and manual LED control.
🔑 MIFARE Classic Key Recovery (Nov - Dec 2025)
- Key Recovery Tools: Developed
mfkey32v2andmfkey64for recovering keys from MIFARE Classic cards. - Cryptographic Core: Implemented
crypto1.candparity.hfor specialized cryptographic operations. - System Utilities: Added platform-independent sleep functions and POSIX utility helpers for improved cross-platform compatibility.
🌐 Connectivity & Data Optimization (Aug 2025)
- Network Protocols: Introduced support for TCP and UDP connections, including dynamic UI labels to identify the connection type (USB, TCP, or UDP).
- Communication Stability: Improved data flow control and added a specific delay for PN532 wakeup sequences to prevent hardware communication errors.
- Data Helpers: Added processing helper functions to handle various input data types more flexibly.
🏷 Tag Support & Emulation (June - Aug 2025)
- Gen3 Tag Support: Fixed 7-byte UID support for Gen3 tags and corrected related parameter checks.
- Emulator Enhancements: Added MFU (MIFARE Ultralight) support for hardware-mode emulators and added the
hf mfu eReadcommand to read data from the PN532Killer emulator. - Data Export: Supported exporting MFU dumps from slots to both JSON and BIN formats.
🔍 Scanning & NDEF Functionality (Mar - May 2025)
- Tag Scanner: Introduced a new PN532 Tag Scanner feature.
- NTAG & NDEF: Added NTAG read functionality that parses NDEF data and can automatically open detected URIs in a web browser.
- Debug Mode: Integrated a dedicated
debugcommand and updated the README with detailed debug mode instructions.
PN523 CLI v1.0.1
Supported Devices
- PN532
- PN532Killer
hf mf commands
- eload Load Mifare Dump to PN532Killer Slot
- eread Get Mifare Classic dump from PN532Killer Slot
- setuid Set UID of magic Mifare classic with UID or block0 on Gen1a, Gen2, Gen3 and Gen4 UMC.
- rdbl Please enter correct parameters
- wrbl Please enter correct parameters
- cview View Gen1a dump
- dump Dump Mifare Classic card
- wipe Wipe Mifare Classic card
hf mfu commands
- rdbl Read Mifare Ultralight block
- wrbl Write Mifare Ultralight block
- dump Dump Mifare Ultralight card
- setuid Set UID of DirectWrite Mifare Ultralight Tag
hf 14a commands
- scan Scan 14a tag, and print basic information
- raw Send iso1444a raw command
- gen4pwd Brute force Gen4 password
hf 15 commands (PN532Killer)
- scan Scan ISO15693 tag, and print basic information
- info Get ISO15693 tag information
- rdbl Read block data from ISO15693 tag
- wrbl Write block data to ISO15693 tag
- raw Send iso15693 raw command
- gen1uid Set UID of Gen1 Magic ISO15693 tag
- gen2uid Set UID of Gen2 Magic ISO15693 tag
- gen2config Set block size of Gen2 Magic ISO15693 tag
- esetuid Set UID of ISO15693 Emulation
- esetblock Set block data of ISO15693 Emulation
- eSetwriteprotect Set write protect of ISO15693 Emulation
- eSetResvEasAfiDsfid Set Resv, EAS, AFI, DSFID of ISO15693 Emulation
lf commands (PN532Killer)
- em { EM commands... }
- scan Scan LF tag, and print basic information
hw mode(PN532Killer)
- r Set device to reader mode
- e Set device to emulator mode
- s Set device to sniffer mode
ntag emulate (PN532)
Emulate with NDEF data such as Url, phone number, email address.
What's Changed
- Add more commands to control the emulator of PN532Killer. by @whywilson in #24
- Merge main to dev by @whywilson in #25
- Fix DTR and RTS by @whywilson in #26
- Added debug mode instructions to README. by @whywilson in #27
- Support Tag Scanner and URL Reader by @whywilson in #28
- Fix 7 Byte UID Gen3 Tag Support by @whywilson in #30
Full Changelog: v1.0.0...v1.0.1
