mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-20 21:33:47 -07:00
add line to changelog
This commit is contained in:
parent
145cd67b0e
commit
c1dbe2f8c1
1 changed files with 1 additions and 0 deletions
|
@ -33,6 +33,7 @@ This project uses the changelog in accordance with [keepchangelog](http://keepac
|
||||||
- Fixed hardnested on AVX512F #2410 (@xianglin1998)
|
- Fixed hardnested on AVX512F #2410 (@xianglin1998)
|
||||||
- Added `hf 14a aidsim` - simulates a PICC (like `14a sim`), and allows you to respond to specific AIDs and getData responses (@evildaemond)
|
- Added `hf 14a aidsim` - simulates a PICC (like `14a sim`), and allows you to respond to specific AIDs and getData responses (@evildaemond)
|
||||||
- Fixed arguments for `SimulateIso14443aTag` and `SimulateIso14443aInit` in `hf_young.c`, `hf_aveful.c`, `hf_msdsal.c`, `hf_cardhopper.c`, `hf_reblay.c`, `hf_tcprst.c` and `hf_craftbyte.c` (@archi)
|
- Fixed arguments for `SimulateIso14443aTag` and `SimulateIso14443aInit` in `hf_young.c`, `hf_aveful.c`, `hf_msdsal.c`, `hf_cardhopper.c`, `hf_reblay.c`, `hf_tcprst.c` and `hf_craftbyte.c` (@archi)
|
||||||
|
- Added `mf_backdoor_dump.py` script that dumps FM11RF08S and similar (Mifare Classic 1k) tag data that can be directly read by known backdoor keys.
|
||||||
|
|
||||||
## [Backdoor.4.18994][2024-09-10]
|
## [Backdoor.4.18994][2024-09-10]
|
||||||
- Changed flashing messages to be less scary (@iceman1001)
|
- Changed flashing messages to be less scary (@iceman1001)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue