fix lau scripts renaming

This commit is contained in:
Philippe Teuwen 2020-09-23 00:11:11 +02:00
commit 610b456a97
17 changed files with 35 additions and 35 deletions

View file

@ -4,7 +4,7 @@ local getopt = require('getopt')
local ansicolors = require('ansicolors')
copyright = ''
usage = 'script run parameters.lua -a 1 -blala -c -de'
usage = 'script run data_example_parameters.lua -a 1 -blala -c -de'
author = 'Martin Holst Swende'
version = 'v1.0.2'
desc = [[
@ -52,7 +52,7 @@ local function main(args)
5 parameters; two with values and three flags. The following
should be valid:
script run parameters.lua -a 1 -blala -c -de
script run data_example_parameters.lua -a 1 -blala -c -de
Notice two things:
1. 'blala' works just like 'b lala', both set 'b' to 'lala'

View file

@ -9,7 +9,7 @@ desc = [[
This script will read the flash memory of RDV4 and print the stored passwords/keys.
It was meant to be used as a help tool after using the BogRun standalone mode before SPIFFS.
You should now use read_pwd_mem_spiffs instead after the updated BogRun standalone mode.
You should now use data_read_pwd_mem_spiffs instead after the updated BogRun standalone mode.
(Iceman) script adapted to read and print keys in the default dictionary flashmemory sections.
]]

View file

@ -26,7 +26,7 @@ It uses both LF and HF simulations.
-- Author note
-- I wrote this as i was doing a PACS audit. This is far from complete, but is easily expandable.
-- The idea was based on proxbrute, but i needed more options, and support for different readers.
-- I dont know LUA, so I used Brian Redbeards lf_bulk_program.lua script as a starting point, sorry if its kludgy.
-- I dont know LUA, so I used Brian Redbeards lf_hid_bulkclone.lua script as a starting point, sorry if its kludgy.
]]
example = [[
@ -110,7 +110,7 @@ local function isempty(s)
return s == nil or s == ''
end
-- The code below was blatantly stolen from Brian Redbeard's lf_bulk_program.lua script
-- The code below was blatantly stolen from Brian Redbeard's lf_hid_bulkclone.lua script
local function toBits(num, bits)
bits = bits or math.max(1, select(2, math.frexp(num)))
local t = {}

View file

@ -128,10 +128,10 @@ local function dump_tag(uid, numsectors)
-- Save the global args, those are *our* arguments
local myargs = args
-- Set the arguments for htmldump script
-- Set the arguments for data_dumptohtml script
args =('-i %s.bin -o %s.html'):format(dumpfile, dumpfile)
-- call it
require('htmldump')
require('data_dumptohtml')
-- Set back args. Not that it's used, just for the karma...
args = myargs

View file

@ -1,7 +1,7 @@
---
-- This Lua script is designed to run with Iceman/RRG Proxmark3 fork
-- Just copy luxeodump.lua to client/luascripts/
-- and run "script run luxeodump"
-- Just copy hf_mf_dump-laundromat.lua to client/luascripts/
-- and run "script run hf_mf_dump-laundromat"
-- requirements
local cmds = require('commands')

View file

@ -60,7 +60,7 @@ end
-- waits for answer from pm3 device
local function checkCommand(response)
if not response then
print("Timeout while waiting for response. Increase TIMEOUT in mfckeys.lua to wait longer")
print("Timeout while waiting for response. Increase TIMEOUT in hf_mf_keycheck.lua to wait longer")
return nil, "Timeout while waiting for device to respond"
end
@ -237,7 +237,7 @@ local function perform_check(uid, numsectors)
local end_time = os.time()
print('')
print('[+] mfckeys - Checkkey execution time: '..os.difftime(end_time, start_time)..' sec')
print('[+] hf_mf_keycheck - Checkkey execution time: '..os.difftime(end_time, start_time)..' sec')
core.fast_push_mode(false)

View file

@ -19,7 +19,7 @@ script run hf_mf_magicrevive [-h] [-u]
]]
arguments = [[
-h this help
-u remagic a Ultralight tag w 7 bytes UID.
-u try to revive a bricked magic Ultralight tag w 7 bytes UID.
]]
---
-- A debug printout-function

View file

@ -1,5 +1,5 @@
-- Run me like this (connected via USB): ./pm3 -l hf_bruteforce.lua
-- Run me like this (connected via Blueshark addon): ./client/proxmark3 /dev/rfcomm0 -l ./hf_bruteforce.lua
-- Run me like this (connected via USB): ./pm3 -l hf_mfc_uidbruteforce.lua
-- Run me like this (connected via Blueshark addon): ./client/proxmark3 /dev/rfcomm0 -l ./hf_mfc_uidbruteforce.lua
local getopt = require('getopt')
local ansicolors = require('ansicolors')

View file

@ -221,13 +221,13 @@ local function configure_magic_ntag(uid)
local pwd, pack = core.keygen_algo_d(uid)
-- Set the arguments for mfu_magic script v1.0.8
-- Set the arguments for hf_mfu_magicwrite script v1.0.8
-- -t 12 == configure NTAG213F
-- -u == set UID
-- -p == set pwd
-- -a == set pack
args =('-t 12 -u %s -p %08X -a %04X'):format(uid, pwd, pack)
require('mfu_magic')
require('hf_mfu_magicwrite')
-- Set back args. Not that it's used, just for the karma...
args = myargs

View file

@ -1,5 +1,5 @@
--
-- lf_bulk.lua - A tool to clone a large number of tags at once.
-- lf_hid_bulkclone.lua - A tool to clone a large number of tags at once.
-- Updated 2017-04-18
-- Updated 2018-02-20 iceman
local getopt = require('getopt')

View file

@ -35,7 +35,7 @@ example = [[
3. script run lf_t55xx_writetest -t PSK1
]]
usage = [[
script run test_t55x7 [-h] [-t <modulation type>
script run lf_t55xx_writetest [-h] [-t <modulation type>
]]
arguments = [[
-h this help