Your cart is empty.
Your cart is empty. Product Specification:
Working frequency: 125KHz + 13.56MHz,
dual frequency
Chipset: UID&T5577(or em4305) dual chip
Read/Write Time:1~2 ms
Read Distance: 3 - 10 mm
Rewritable: >100,000 times
Data Retention: >10 years
Features: writable, rewritable, not HID card.
Can be used to copy UID code from other card.
Material: ABS
plastic Color: Black,Blue,Red
Quantity: package of 5 pieces
Size: 44 * 31 * 3 mm
Applications: suitable for access control system of hotel, apartments, school, etc.
These keyfobs can be used as backup cards, used to copy or clone same frequency cards.
Todd in Greensboro
2025-08-20 18:52:42
These are described as dual chip (RFID and NFC), and the description states "Can be used to copy UID code from other cards." But I was not able to write to these as NFC Mifare Classic 1K using a Flipper Zero. I tried all five in the pack and none of them work for 13.6 Mhz NFC with a Flipper Zero. The description led me to believe that these are changeable UID (a.k.a. "Magic card"), but they are not.I was able to write to the 125 kHz RFID tag without any problem.
Jeane
2025-04-05 17:04:29
I bought 10 of these. None of them works.
William Taylor
2024-12-09 13:51:05
I have bought and tested these, as I was facinated by the bad reviews about the HF side not being UID changeable.Well, it is fine.there are some catches though, and you will likely need a proxmark to do it.Many cheap chinese cloners probably won't be able to write to these tags.Ok, first to say, the t5577 chip is a genuine one that supports multiple downlinks and test mode, Nice!!!The Mf1k side is a gen2 cuid with gen4 uscuid supposedly as well.It requires direct block 0 write, *not* the chinese magic write.so the cwrite and csetuid commands won't work.This is good, because a lot of access control systems exploit that to discover and break coppied tags.What to do, and it's a bit of faffing, but first make a copy onto a gen1a magic card, and set everything up as you want it.hf mf csetuid -u 11223344This will correctly calculate bcc bytes etc. and so you won't make a brick by getting that wrong!Now read the whole block back and look in the logs and copy it exactly to the folloeing command:place this product on the HF side of the proxmark and do:hf mf wrbl --force --b 0 -d 02003200300804006263646566676869where the stuff after -d is your block to be written.It works!Yes, it's a fiddle for the inexperienced, but it's worth it because it will not be detected as a clone by the majority of building access systems.The flipper0 people are busy hoovering up code from proxmark, and I'm sure they will eventually implament write commands for these.
Recommended Products