
ProxmarkPro - How to Save/Load a Tag to SD Card
This blog post covers the steps of how to save and load a tag using the ProxmarkPro.

ProxmarkPro - Using HID Brute
This blog post covers how to do a brute force attack with a HID tag on the ProxmarkPro. A Brute force attack is done by trying to guess multiple tag UID's similar to a known working tag UID to gain access.

ProxmarkPro - Cloning a HID Tag
This blog post covers the steps to clone a HID tag to a T5577 with a ProxmarkPro.

ProxmarkPro - Identifying Unknown Tags
This blog post covers the steps of how to determine an Unknown card with a ProxmarkPro.

The Future of Proxmark3 Standalone Mode
Using a Proxmark3 in red team scenarios can be very difficult. Whether it's the new RDV4 or older models, these all require extra components - USB battery, cables, mobile phone, etc.
We set out to meet those goals and believe we've come up with a close to ideal solution - The ProxmarkPro.

Making a Physical Mifare 1K UID Clone
Follow these steps to learn how to use a Chinese Magic Card 1K to make a Physical Mifare 1K UID clone. This blog is using a Proxmark3 running firmware V3.0.1.

Making a physical HID Prox 2 Clone - Firmware V3.0.1
Follow these easy steps to make a physical HID Prox 2 clone using the Proxmark3 with firmware V3.0.1.

Making a physical EM4100 Clone - Firmware V3.0.1
Follow these steps to make a physical EM4100 clone using the Proxmark3 firmware version 3.0.1.

Improvements to Proxmark3 Kit
We are now shipping improved Proxmark3's and Antennas with every Proxmark3 Kit purchase. These improvements provide better read range and reliability. Read our blog post for more details.

Black Hat / Defcon Sale - 2018
BH/DC sale until August 15th 2018. Get 10% off plus free shipping on purchase of $200 or more.