High Frequency RFID Key Fob Duplication Instructions

 

🔐 Schlage 9651T, MIWA, Dormakaba and Vingcard — Cloning Instructions

The Schlage 9651T, MIWA, and Vingcard is a high-frequency encrypted key fob. It is duplicated using the USB reader included in your kit.

✅ High Frequency (Encrypted)
Use the USB reader and PN532 cloning software to decrypt and duplicate the fob.

💻 High Frequency Cloning — USB Reader

  1. Plug the USB reader into your computer.
  2. Download the cloning software for your operating system:
    https://github.com/jumpycalm/pn532-cloner/releases/

💻 Choose the Correct File for Your Computer

  • PN532-Cloner-Mac-x64.tar — for MacOS
  • PN532-Cloner-Win-x64.exe — for Windows

Download and open the version that matches your computer.

🍎 Mac Users — Important Setup Instructions

The file downloaded from GitHub is in .tar format. Double-click the file to extract (unzip) it.

After extraction, locate the unzipped executable file. Hold Control and click the file, then select Open With → Terminal.

If your Mac blocks the app because Apple cannot verify the developer, go to System Settings → Privacy & Security, scroll down, and click “Open Anyway.”

▶️ Cloning Steps

  1. Download and run the PN532-Cloner file. This will open a Terminal window where the cloning software runs.
    • MacOS: Opens the Terminal app.
    • Windows: Opens Command Prompt / Windows Terminal.
  2. Place your original fob on the reader.
    ⚠️ Do not use the reader on a metal surface.
    ⚠️ Keep your computer awake during the process.
  3. In the Terminal window, type r and press Enter.
  4. Wait until you see “Read Success.”
  5. Remove the original fob and place your blank fob on the reader.
  6. Type w and press Enter.
  7. When you see “Write Success”, your new fob is ready to use 🎉