mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 05:43:48 -07:00
begin of dynamic capabilities handling in client
This commit is contained in:
parent
5a6929c533
commit
ca43afa19b
55 changed files with 554 additions and 536 deletions
|
@ -1464,23 +1464,23 @@ static int CmdEM4x05Info(const char *Cmd) {
|
|||
}
|
||||
|
||||
static command_t CommandTable[] = {
|
||||
{"help", CmdHelp, 1, "This help"},
|
||||
{"help", CmdHelp, AlwaysAvailable, "This help"},
|
||||
//{"410x_demod", CmdEMdemodASK, 0, "Extract ID from EM410x tag on antenna)"},
|
||||
{"410x_demod", CmdEM410xDemod, 1, "demodulate a EM410x tag from the GraphBuffer"},
|
||||
{"410x_read", CmdEM410xRead, 0, "attempt to read and extract tag data"},
|
||||
{"410x_sim", CmdEM410xSim, 0, "simulate EM410x tag"},
|
||||
{"410x_brute", CmdEM410xBrute, 0, "reader bruteforce attack by simulating EM410x tags"},
|
||||
{"410x_watch", CmdEM410xWatch, 0, "watches for EM410x 125/134 kHz tags (option 'h' for 134)"},
|
||||
{"410x_spoof", CmdEM410xWatchnSpoof, 0, "watches for EM410x 125/134 kHz tags, and replays them. (option 'h' for 134)" },
|
||||
{"410x_write", CmdEM410xWrite, 0, "write EM410x UID to T5555(Q5) or T55x7 tag"},
|
||||
{"4x05_dump", CmdEM4x05Dump, 0, "dump EM4x05/EM4x69 tag"},
|
||||
{"4x05_info", CmdEM4x05Info, 0, "tag information EM4x05/EM4x69"},
|
||||
{"4x05_read", CmdEM4x05Read, 0, "read word data from EM4x05/EM4x69"},
|
||||
{"4x05_write", CmdEM4x05Write, 0, "write word data to EM4x05/EM4x69"},
|
||||
{"4x50_dump", CmdEM4x50Dump, 0, "dump EM4x50 tag"},
|
||||
{"4x50_read", CmdEM4x50Read, 0, "read word data from EM4x50"},
|
||||
{"4x50_write", CmdEM4x50Write, 0, "write word data to EM4x50"},
|
||||
{NULL, NULL, 0, NULL}
|
||||
{"410x_demod", CmdEM410xDemod, AlwaysAvailable, "demodulate a EM410x tag from the GraphBuffer"},
|
||||
{"410x_read", CmdEM410xRead, IfPm3Present, "attempt to read and extract tag data"},
|
||||
{"410x_sim", CmdEM410xSim, IfPm3Present, "simulate EM410x tag"},
|
||||
{"410x_brute", CmdEM410xBrute, IfPm3Present, "reader bruteforce attack by simulating EM410x tags"},
|
||||
{"410x_watch", CmdEM410xWatch, IfPm3Present, "watches for EM410x 125/134 kHz tags (option 'h' for 134)"},
|
||||
{"410x_spoof", CmdEM410xWatchnSpoof, IfPm3Present, "watches for EM410x 125/134 kHz tags, and replays them. (option 'h' for 134)" },
|
||||
{"410x_write", CmdEM410xWrite, IfPm3Present, "write EM410x UID to T5555(Q5) or T55x7 tag"},
|
||||
{"4x05_dump", CmdEM4x05Dump, IfPm3Present, "dump EM4x05/EM4x69 tag"},
|
||||
{"4x05_info", CmdEM4x05Info, IfPm3Present, "tag information EM4x05/EM4x69"},
|
||||
{"4x05_read", CmdEM4x05Read, IfPm3Present, "read word data from EM4x05/EM4x69"},
|
||||
{"4x05_write", CmdEM4x05Write, IfPm3Present, "write word data to EM4x05/EM4x69"},
|
||||
{"4x50_dump", CmdEM4x50Dump, IfPm3Present, "dump EM4x50 tag"},
|
||||
{"4x50_read", CmdEM4x50Read, IfPm3Present, "read word data from EM4x50"},
|
||||
{"4x50_write", CmdEM4x50Write, IfPm3Present, "write word data to EM4x50"},
|
||||
{NULL, NULL, NULL, NULL}
|
||||
};
|
||||
|
||||
static int CmdHelp(const char *Cmd) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue