MIFARE Classic Tool

2.1M installs
2.8K ratings
53.4K monthly active users
Revenue not available
Install Trends
Weekly +7K
Steady
Monthly +36.3K
Trending

MIFARE Classic Tool Summary

MIFARE Classic Tool is a mobile Android app in Tools by IKARUS Projects. Released in May 2013 (12 years ago). It has about 2.1M+ installs and 2.8K ratings with a 4.06★ (good) average. Based on AppGoblin estimates, it reaches roughly 53.4K monthly active users . Store metadata: updated Jan 25, 2026, version 68.

Recent activity: 7K installs this week (36.3K over 4 weeks) showing strong growth , and 3.00 new ratings this week View trends →

Data tracking: SDKs and third-party integrations were last analyzed on Mar 2, 2026. The app's network data flows (API traffic to/from the app and its SDKs) were last crawled on Nov 7, 2025.

Store info: Last updated on Google Play on Jan 25, 2026 (version 68).


4.06★

Ratings: 2.8K

5★
4★
3★
2★
1★

Screenshots

App screenshot
App screenshot
App screenshot
App screenshot

App Description

Read, write, analyze, etc. MIFARE® Classic RFID-Tags!

This is a low-level tool for reading, writing and analyzing MIFARE® Classic RFID tags. It is designed for users who have at least basic familiarity with the MIFARE® Classic technology. It provides several features to interact with (and only with) MIFARE® Classic RFID-Tags.


GENERAL INFORMATION
This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags.
It is designed for users who have at least basic familiarity with the MIFARE Classic technology.

Please read the whole page and make sure you got everything right before rating. If you like MCT please consider to buy the donate version.


My dump/key files are gone after updating MCT!
No. Read this: https://github.com/ikarus23/MifareClassicTool/issues/326


FEATURES
• Read MIFARE Classic tags
• Save and edit the tag data you read
• Write to MIFARE Classic tags (block-wise)
• Clone MIFARE Classic tags
(Write dump of a tag to another tag; write 'dump-wise')
• Key management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.)
• Format a tag back to the factory/delivery state
• Write the manufacturer block of special MIFARE Classic tags
• Create, edit and save key files (dictionaries)
• Decode & Encode MIFARE Classic Value Blocks
• Decode & Encode MIFARE Classic Access Conditions
• Compare dumps (Diff Tool)
• Display generic tag information
• Display the tag data as highlighted hex
• Display the tag data as 7-Bit US-ASCII
• Display the MIFARE Classic Access Conditions as a table
• Display MIFARE Classic Value Blocks as integer
• Calcualate the BCC
• Quick UID clone feature
• Import/export to common file types
• In-App (offline) help and information
• It's open source (GPLv3) ;)


IMPORTANT NOTES
Some important things are:
• The features this tool provides are very basic. There are no such
fancy things like saving a URL to an RFID-Tag with a nice looking
graphical user interface. If you want so save things on a tag,
you have to input the raw hexadecimal data.
• This App can NOT crack/hack
any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
need keys for this specific tag first. For additional information