- To reproduce the attack you simply run pm3server.py to launch a local http server for capturing and saving the UIDs Received.
- Run capture.py to prepare your proxmark3 to detect near cards & dump the UID
- While the data in being captured now you can run the final script sim.py to pick which captured card you want to simulate via the second proxmark3
Happy Hacking