Stealth Decoy Reader
THE PROBLEM Extracting RFID & Keypad credentials via spliced implants is a well-known technique. However, these tools are rarely used in professional audits: installations are slow and complicated, and damage to wiring, hardware and infrastructure are rarely authorised in Scope of Engagement documents. The implants themselves have limited functionality and protocol support, and only provide the "capture" part of an RFID Audit lifecycle. The analysis and cloning of a captured credential requires multiple manual steps, tools and skills. THE SOLUTION Imagine walking into an audit, placing an access control reader on a wall and instantly collecting credentials. Your phone gives you real-time notifications of skimmed badges and PIN codes, and directly writes a clone badge with your Proxmark. You don't need a computer, you don't need to damage client property, you don't need to memorise arcane Proxmark commands. Everything is taken care of. When the audit is over, you've got a timestamped log of all operations, ready for export into a report. Your time and skills are spent on the audit, instead of the tools. You've just imagined the Stealth Decoy Reader platform, a next-generation, non-destructive credential capture system designed specifically for red-teamers and pentesters. The Stealth Decoy Reader is an open-source, battle-tested hardware module built to collect and exfiltrate all known corporate access-control protocols and PIN codes. Even better, the Stealth Decoy Reader is available pre-installed inside the most common access control readers for perfect camouflage. The readers come equipped with non-destructive mounting systems, ready for rapid placement in public areas, choke points, doorways, cabinets, etc. Rapid deployment during public access Credential capture Instant notifications and credential management One-click cloning via Proxmark 3 The Stealth Decoy Reader Platform covers the full RFID pentest life-cycle: Capture: Rapidly deployed, instant multi-factor credential skimming Control: Manage multiple devices, analyse, save, tag and exfiltrate captured credentials via the cross-platform WebUI. Clone: Emulate, clone and write captured credentials directly from the UI via Proxmark 3. One click & wireless: No command lines, no code. Access: Gain and escalate access via cloned RFID. MULTI-PROTOCOL Supports all corporate RFID and keypad protocols, including HID & Wiegand, iCLASS, Indala, Paxton.. UNDETECTABLE Physical switch to deactivate WiFi for undetectable installation, NAC evasion, and reduced RF exposure. NON-DESTRUCTIVE INSTALLATION No need to remove readers, crimp cables or damage client hardware. Deploy and remove in seconds. PROFESSIONAL TOOL & SUPPORT Built by pentesters based on real-world requirements: modern hardware, software and frequent updates. POWERED BY STEALTH Inside every Stealth Decoy Reader is a Stealth Decoy Module - the high-performance, multi-protocol, wireless equipped RFID capture, analysis and cloning device. It works hand-in hand with the Doppelgänger Assistant, a cross-platform professional GUI application designed to handle every possible operation requirement. Together, they allow for automated card capture and wireless credential exfiltration. Teams can collaborate and share credentials; credentials can be analysed, exported or cloned. The Doppelgänger Assistant also works as a easy-to-use UI for the Proxmark 3, making credential writing, cloning and verification a one-click operation. Don't miss opportunities because of knowledge gaps or constrained time: the Doppelgänger Suite is a results-oriented system for complete RFID audits. 1 2 3 4 4 1. REAL HARDWARE Legitimate readers with the Stealth Decoy Reader modules embedded inside are indistinguishable from your client's existing readers. 2. MULTI-FACTOR CREDENTIALS Skim RFID and matching PIN credentials simultaneously. Handles all corporate protocols, including iCLASS SE/SEOS/SR. 3. NEVER MISS A CREDENTIAL Support for all major corporate RFID systems. Frequent firmware and software updates. Never miss a credential. 4. NO RISK, NO DAMAGE INSTALLS No risky, lengthy or destructive installation or hardware modifications required. Deploy in seconds. Runs on internal power. 5. BUILT FOR DISCRETION Credential capture is silent, and can trigger notifications, SMS or emails. Hardware switch to disable all RF emissions. FIELD-READY WORKFLOW Unlike traditional approaches for RFID audits, the Stealth Decoy Reader system provides a full end-to-end workflow for RFID audits. What previously required highly technical knowledge, complicated wiring, fussy tools and unstable software is replaced by an all-in-one device and intuitive, cross-platform software. Red-teamers and auditors can literally turn on the device, attach it to an appropriate wall / door / cabinet / public choke-point and instantly collect credentials. Captured cards can be detected, analysed and exported to other team-members, or effortlessly simulated or physically cloned wirelessly via a Proxmark - the included Doppelgänger Assistant handles everything. The Long Range Reader and Doppelgänger ecosystem covers every step of an RFID Audit: acquisition, exfiltration & analysis, duplication and access / escalation. 1 2 3 4 1. MULTI-FACTOR ACQUISITION Capture RFID & PIN Credentials, silently. Rapid deployment. No wiring or complex setup required. Turn on, drop and go. 2. CROSS-PLATFORM UI Get instant notifications of captures, across multiple readers. Share readers and card data in real-time with colleagues. 3. PROXMARK3 INTEGRATION Instantly emulate or clone captured credentials via the Proxmark 3 directly via the UI. No commands, no code, no wires. 4. FIELD-TESTED RESULTS The Stealth Decoy Reader system is purpose-built by professional red-teamers to be results oriented. RFID Audits just got better and easier. AVAILABLE MODELS & TECHNICAL DETAILS Every major corporate reader is available - simply take the unit that your client uses for undetectable credential harvesting. Devices ships preconfigured with your choice of integrated reader hardware. For convenience, we have a product selection assistant to help you determine which model / device you require. Available Models Model Type Protocols HID multiCLASS SE RP40 HID multiCLASS SE RP40 RFID RFID+Keypad HID iCLASS Legacy HID iCLASS SE/SEOS/SR MIFARE Classic (via SE) MIFARE DESFire HID Prox, AWID, EM4102, T5577 HID Signo 20TKS HID Signo 20KTKS HID Signo 40TKS HID Signo 40KTKS RFID RFID+Keypad HID iCLASS Legacy HID iCLASS SE/SEOS/SR MIFARE Classic (via SE) MIFARE DESFire Indala HID Prox, AWID, EM4102, T5577 Paxton P75 Paxton PK75 RFID RFID+Keypad Paxton Net2 The stand-alone module is compatible with all the above protocols and authentication methods. Technical Specifications Feature Notes UI Cross Platform App / WebUI Integration Integrates with Proxmark3 RDV4. One-click cloning and emulation. Wireless operation via Blueshark. BACKED BY REAL-WORLD TRAINING & CERTIFICATION Beyond the professional support, highly-detailed documentation and active development - real-world training is available for all PPE products. Covering comprehensive product learning to in-the-field assignments simulating the toughest operating conditions, for individuals and teams. EUROPE We recommend Covert Access Team for Europe-based training. Highly reputed and intimately familiar specifically with this hardware, they have multiple training modules, both online and offline. NORTH AMERICA For North American clients, we recommend the product's creators Mayweather Group. Field-trained and objective focused, Mayweather's products are deeply ingrained in their workshops. What's included Access Control Hardware of choice Stealth Decoy Reader (preinstalled) PPE 3.7V 1800mAh LiPo battery PPE Stealth Card HID iCLASS 2k card (HID Variants Only) T5577 card Magnetic mounting plate Hook-and-pile mounting strips The "Module + Battery Only" variant includes: Stealth Decoy Reader (preinstalled) PPE 3.7V 1800mAh LiPo battery Recommended Accessories Proxmark3 RDV4 (with optional Bluetooth Extension) PPE Dual Battery Charger Resources Stealth Decoy Reader Hardware Documentation Firmware Documentation and Configuration Doppelgänger Assistant Documentation and Configuration Firmware & Flashing Documentation
Specifications
- Version
- RP40 multiCLASS SE, RPK40 multiCLASS SE, 20TKS multiCLASS SE, 40TKS multiCLASS SE, 20KTKS multiCLASS SE, 40KTKS multiCLASS SE, Paxton P75, Paxton KP75, Module + Battery Only
Variants (9)
- RP40 multiCLASS SE — 375.00 USD — In stock
- RPK40 multiCLASS SE — 650.00 USD — In stock
- 20TKS multiCLASS SE — 400.00 USD — In stock
- 40TKS multiCLASS SE — 410.00 USD — In stock
- 20KTKS multiCLASS SE — 675.00 USD — In stock
- 40KTKS multiCLASS SE — 685.00 USD — In stock
- Paxton P75 — 325.00 USD — In stock
- Paxton KP75 — 450.00 USD — In stock
- Module + Battery Only — 125.00 USD — In stock
AI Readiness
Good foundation, but some important product data is still missing.