Back to Proxmark3

HF_COLIN — VIGIKPWN MIFARE Classic Ultra-Fast Sniff/Sim/Clone

doc/standalone/hf_colin.md

4.92372.2 KB
Original Source

HF_COLIN — VIGIKPWN MIFARE Classic Ultra-Fast Sniff/Sim/Clone

Author: Colin Brigato Frequency: HF (13.56 MHz) Hardware: RDV4 (requires flash memory)

Back to Standalone Modes Index | Source Code | Development Guide


What

A specialized MIFARE Classic attack mode designed for French VIGIK access control systems. It performs fast authentication attempts using ~37 hardcoded VIGIK keys, dumps the card, and can simulate or clone it.

Why

VIGIK is a widely deployed intercom/access control system in French apartment buildings. It uses MIFARE Classic with a known set of keys. This mode automates the entire VIGIK attack chain — from key discovery to cloning — entirely on-device.

How

  1. SEARCH: Scans for MIFARE Classic cards
  2. READ: Attempts authentication with hardcoded VIGIK keys, reads accessible sectors
  3. LOAD: Loads captured data for simulation via JSON schema
  4. EMULATE: Simulates the captured card

The mode uses a terminal-style UI with cursor positioning for status display.

LED Indicators

LEDMeaning
Complex terminal UIUses debug output for status rather than traditional LED patterns

Button Controls

ActionEffect
Various pressesTrigger different functions in the UI

State Machine

mermaid
stateDiagram-v2
    [*] --> SEARCH : Startup

    SEARCH --> READ : MFC card found
    READ --> LOAD : Keys found,\nsectors dumped
    LOAD --> EMULATE : Data loaded

    EMULATE --> SEARCH : Cycle back
    
    READ --> SEARCH : No valid keys
    
    SEARCH --> [*] : Exit

Compilation

make clean
make STANDALONE=HF_COLIN -j
./pm3-flash-fullimage