NFC Copy Cat, manufactured by Electronic Cats, is a small device that combines two powerful cybersecurity tools, NFCopy and MagSpoof. NFCopy works by reading or emulating a NFC card; depending on the necessities of the researcher. On the other hand, MagSpoof can wirelessly emulate/spoof any magnetic stripe card. So using NFC Copy Cat, the user will have a device capable of storing magnetic stripe data or NFC payment data to be replayed later — known in the cybersecurity world as a replay attack.
Have some info to add for this board? Edit the source for this page here.
This is the latest stable release of CircuitPython that will work with the NFC Copy Cat.
Start here if you are new to CircuitPython.
This is the latest unstable release of CircuitPython that will work with the NFC Copy Cat.
Unstable builds have the latest features but are more likely to have critical bugs.
Built-in modules available: analogio, board, busio, digitalio, math, microcontroller, neopixel_write, nvm, os, pulseio, random, rotaryio, rtc, storage, struct, supervisor, time, touchio, usb_hid, usb_midi
Every time we commit new code to CircuitPython we automatically build binaries for each board and language. The binaries are stored on Amazon S3, organized by board, and then by language. Try them if you want the absolute latest and are feeling daring or want to see if a problem has been fixed.
All previous releases are listed on GitHub, with release notes, and are available for download from Amazon S3. They are handy for testing, but otherwise we recommend using the latest stable release. Some older GitHub release pages include the same binaries for downloading. But we have discontinued including binaries as assets on newer release pages because of the large number of files for each release.