iceman1001
b5ecdde19e
fixes and textual
2024-08-29 12:27:11 +02:00
Philippe Teuwen
06e98f4643
Make mkversion.sh POSIX compliant (dash complains about [[)
2024-08-27 18:48:20 +02:00
douniwan5788
413a17a7a6
feature: Make the FPGA bitstreams working with SKIP_* define.
...
Now, you can enable at least two of your favorite technologies (such as LF and HF 14443A) attached a standalone mode and still have spare ROM space for other functionalities on a Proxmark3 Easy with a 256KiB ROM.
2024-08-26 20:55:59 +08:00
iceman1001
6a95f16102
style and text
2024-08-25 15:17:02 +02:00
Philippe Teuwen
a17507d4d3
MFC authentication protocol example code, that served to generate the paper annexes and could be useful as implementation ref for other researches
2024-08-23 18:08:35 +02:00
douniwan5788
d15537bbf1
Unified hitag naming style
2024-08-22 02:01:43 +08:00
douniwan5788
2527b2a8c3
fix: sha256sum: command not found on macOS
2024-08-20 22:44:00 +08:00
Philippe Teuwen
691e76675a
mfc/fudan: add paper ref
2024-08-16 17:46:00 +02:00
Philippe Teuwen
b700b1cd08
fix tools compilation with clang
2024-08-14 21:23:43 +02:00
Philippe Teuwen
1e95f70386
fix staticnested_1nt
2024-08-05 20:51:19 +02:00
Philippe Teuwen
ee8b9ca74b
make style
2024-08-03 21:21:11 +02:00
Philippe Teuwen
1a20cb3e8a
staticnested_0nt: better threading, should finish a bit faster
2024-08-03 21:08:29 +02:00
Philippe Teuwen
f8ed473aec
words
2024-08-02 21:04:23 +02:00
nvx
2432b4282a
Fix staticnested_0nt on mingw/proxspace
...
Fixes keyCount_mutex[0] and keyCounts[0] not being properly initialised
Fixes progress reporting not properly clearing the line
Switch malloc(a*b) style calls to calloc(a, b)
2024-08-02 22:13:04 +10:00
Philippe Teuwen
b63c689cf6
fix proxspace compilation issue with staticnested_0nt
2024-08-02 00:35:47 +02:00
Philippe Teuwen
9057371b2c
pm3_tests: more staticnested* tests
2024-08-02 00:12:07 +02:00
Philippe Teuwen
045a4c7fc6
staticnested_2x1nt_rf08s: fix malloc bug
2024-08-02 00:10:52 +02:00
Philippe Teuwen
c47578c048
sort mfc tools
2024-08-02 00:10:23 +02:00
Philippe Teuwen
4e0d4d3ad4
fix nonce2key example
2024-08-01 15:55:15 +02:00
Philippe Teuwen
78510f33a0
bit of doc...
2024-07-30 17:18:31 +02:00
Philippe Teuwen
7fec0d693c
Added few tools to tackle FM11RF08S cards
2024-07-30 16:41:00 +02:00
Philippe Teuwen
30984174db
document ST25TN512 KeyID
2024-07-29 11:50:04 +02:00
iceman1001
791d9e09ac
write check wrong, write returns number of bytes written, hence always larger than 0. Thanks to @mwalker33 for the fix
2024-07-21 11:37:47 +02:00
iceman1001
8ee0df159d
fix output
2024-07-12 15:41:45 +02:00
iceman1001
30c4f0a924
text
2024-07-11 11:04:40 +02:00
iceman1001
05b50a6c26
fix #2418 - the tool mf_nonce_brute has in some odd cases when bruteforcing the last upper 16 bits a chance of actually decrypt the four bytes into a valid mifare classic protocol command with a valid ISO14443-a CRC. See github issue for example.\n We now bruteforce all 0xFFFF keyspace and keep track of how many candidates was found. The output has been improved to help user in this case too.
2024-07-11 10:57:19 +02:00
iceman1001
6e6d00505f
added the tears_for_fears.py script by Pierre Granier
2024-06-06 14:45:06 +02:00
iceman1001
98acac3fc2
fix unused warning
2024-05-28 09:52:27 +02:00
iceman1001
d3d701f538
the generation of NrAr is used in the regression tests. I readded the old way and if you call the hitag2_gen_nRaR.py with five params, you get the nice commands instead
2024-05-27 15:08:49 +02:00
Philippe Teuwen
676c91baaf
pk st25tn
2024-05-16 23:50:35 +02:00
Iceman
2b276cae1a
Merge pull request #2385 from henrygab/em4x70_add_tests
...
add `lf em 4x70 calc` and self-tests
2024-05-15 09:19:41 +02:00
Henry Gabryjelski
20711e7037
Add em4x70 tests
2024-05-14 21:06:35 -07:00
iceman1001
5fd4d7e774
fix const param, bitwiseboolean
2024-05-14 14:29:30 +02:00
iceman1001
480d5a3241
array init
2024-05-14 11:26:16 +02:00
Henry Gabryjelski
c40f4be3e6
re-enable broken hitag2 test
2024-05-06 07:59:41 -07:00
Henry Gabryjelski
9d33646b80
Disable broken hitag2 test so github actions work
2024-05-05 18:27:35 -07:00
Philippe Teuwen
455d4a9a74
key id 01?
2024-04-23 22:58:18 +02:00
Philippe Teuwen
5ca6d5c493
Update recover_pk.py
2024-04-23 22:51:47 +02:00
iceman1001
3ef3e3a63d
update signature data
2024-04-23 02:16:01 +02:00
Benjamin DELPY
e6ad06a2c8
Update recover_pk.py with first TruST25 (ST) key
...
TruST25 (ST) - KeyID 0x04?
`curve=secp128r1, hash=sha256` - from block 63 in ST25TV, starting with KeyID?
Tested on multiple `ST25TV02KC` - `K04S` at block 63, signature in ... ASCII...
Signed-off-by: Benjamin DELPY <benjamin@gentilkiwi.com>
2024-04-23 01:11:05 +02:00
iceman1001
c8849af5e0
This is the major changes made to the HITAG2 commands. Its heavly based on RFIDLers implementation and its been converted to work with Proxmark3. Special thanks to @kevsecurity for his amazing implementations of the Gone in 360 Seconds paper by Roel, Flavio & Balasch. Thanks to @adamlaurie for his RFIDler project. It wouldnt been doable without it.
2024-04-22 16:20:24 +02:00
iceman1001
1b45112ad0
style
2024-04-22 09:40:50 +02:00
iceman1001
042ba20d58
style
2024-04-22 09:36:42 +02:00
iceman1001
67c14c5314
adapt regression tests
2024-04-22 09:21:55 +02:00
Jaka
c871e435e4
fix implicit use of time()
2024-04-18 09:40:00 +02:00
iceman1001
9a73e77d72
style
2024-04-11 22:08:25 +02:00
iceman1001
4e540053e9
style
2024-04-07 11:38:51 +02:00
iceman1001
ab2e3d5179
updated the OpenCL Headers from https://github.com/KhronosGroup/OpenCL-Headers/tree/main/CL .
2024-03-26 15:08:34 +01:00
iceman1001
529d57a181
style
2024-03-25 23:34:53 +01:00
iceman1001
140cc1d957
style
2024-03-25 23:33:44 +01:00