An advanced NFC UID analysis and testing tool for the Flipper Zero.
UID Brute Smarter is a security research tool for authorized penetration testing and access control system auditing. It provides advanced NFC key management and intelligent pattern detection to build and execute comprehensive security assessments.
⚠️ IMPORTANT: This tool is intended for authorized security testing only. Users must obtain proper authorization before testing any systems they do not own or have explicit permission to test.
- NFC File Loading: Load NFC files with metadata extraction.
- Key Tracking: Per-key metadata including filename, UID, and load time.
- Key Browser: Browse and manage loaded keys with UID display.
- Bulk Operations: Load multiple keys or unload all at once.
- Memory Safety: Proper cleanup and memory management.
- Advanced Algorithms: Detects +1, +K, 16-bit counter, and bitmask patterns.
- Range Generation: Automatically creates test ranges based on detected patterns.
- Pattern Validation: Ensures generated ranges are within safe bounds.
- Configurable Limits: Prevents excessive range generation.
- Adjustable Timing: Configurable delays between attempts (100ms-1000ms).
- Pause Management: Set pause intervals to prevent system overload.
- Progress Tracking: Real-time progress display during testing.
- Safe Stopping: Graceful interruption capabilities.
- Intuitive Interface: Clean GUI following Flipper design principles.
- Detailed Feedback: Clear notifications for all operations.
- Error Handling: Comprehensive validation and user feedback.
- Flipper Zero with Momentum Firmware
- USB cable for installation.
# Clone the repository
git clone https://github.com/fbettag/uid_brute_smarter.git
cd uid_brute_smarter
# Build and install directly to a connected Flipper
./fbt launch APPSRC=uid_brute_smarter# Build the application
./fbt fap_uid_brute_smarter- Download the latest
.fapfile from Releases - Copy to Flipper Zero via USB or qFlipper.
- Launch from Apps → NFC → UID Brute Smarter
- Authorization: Ensure you have explicit written authorization for target systems.
- Key Collection: Load authorized test cards (
.nfcfiles) from the/ext/nfc/folder. - Configuration: Adjust delay and pause settings as needed.
- Key Management: View, manage, or unload keys.
- Testing: Start the brute-force attack and monitor progress.
- +1 Linear: Sequential incrementing patterns.
- +K Linear: Fixed step patterns (16, 32, 64, 100, 256).
- 16-bit Counter: Little-endian counter patterns.
- Bitmask: Patterns where only a few bits are changing.
- Unknown: Safe range expansion around provided keys.
- NFC Files: Standard
.nfcfiles with ISO14443-3a data. - UID Length: 4-byte UIDs.
- Issues: GitHub Issues for bug reports.
- Discussions: GitHub Discussions for questions.
This project is licensed under the BSD 3-Clause License.