Commit graph

701 commits

Author SHA1 Message Date
iceman1001
b5ecdde19e fixes and textual 2024-08-29 12:27:11 +02:00
Philippe Teuwen
06e98f4643 Make mkversion.sh POSIX compliant (dash complains about [[) 2024-08-27 18:48:20 +02:00
douniwan5788
413a17a7a6 feature: Make the FPGA bitstreams working with SKIP_* define.
Now, you can enable at least two of your favorite technologies (such as LF and HF 14443A) attached a standalone mode and still have spare ROM space for other functionalities on a Proxmark3 Easy with a 256KiB ROM.
2024-08-26 20:55:59 +08:00
iceman1001
6a95f16102 style and text 2024-08-25 15:17:02 +02:00
Philippe Teuwen
a17507d4d3 MFC authentication protocol example code, that served to generate the paper annexes and could be useful as implementation ref for other researches 2024-08-23 18:08:35 +02:00
douniwan5788
d15537bbf1 Unified hitag naming style 2024-08-22 02:01:43 +08:00
douniwan5788
2527b2a8c3 fix: sha256sum: command not found on macOS 2024-08-20 22:44:00 +08:00
Philippe Teuwen
691e76675a mfc/fudan: add paper ref 2024-08-16 17:46:00 +02:00
Philippe Teuwen
b700b1cd08 fix tools compilation with clang 2024-08-14 21:23:43 +02:00
Philippe Teuwen
1e95f70386 fix staticnested_1nt 2024-08-05 20:51:19 +02:00
Philippe Teuwen
ee8b9ca74b make style 2024-08-03 21:21:11 +02:00
Philippe Teuwen
1a20cb3e8a staticnested_0nt: better threading, should finish a bit faster 2024-08-03 21:08:29 +02:00
Philippe Teuwen
f8ed473aec words 2024-08-02 21:04:23 +02:00
nvx
2432b4282a Fix staticnested_0nt on mingw/proxspace
Fixes keyCount_mutex[0] and keyCounts[0] not being properly initialised
Fixes progress reporting not properly clearing the line
Switch malloc(a*b) style calls to calloc(a, b)
2024-08-02 22:13:04 +10:00
Philippe Teuwen
b63c689cf6 fix proxspace compilation issue with staticnested_0nt 2024-08-02 00:35:47 +02:00
Philippe Teuwen
9057371b2c pm3_tests: more staticnested* tests 2024-08-02 00:12:07 +02:00
Philippe Teuwen
045a4c7fc6 staticnested_2x1nt_rf08s: fix malloc bug 2024-08-02 00:10:52 +02:00
Philippe Teuwen
c47578c048 sort mfc tools 2024-08-02 00:10:23 +02:00
Philippe Teuwen
4e0d4d3ad4 fix nonce2key example 2024-08-01 15:55:15 +02:00
Philippe Teuwen
78510f33a0 bit of doc... 2024-07-30 17:18:31 +02:00
Philippe Teuwen
7fec0d693c Added few tools to tackle FM11RF08S cards 2024-07-30 16:41:00 +02:00
Philippe Teuwen
30984174db document ST25TN512 KeyID 2024-07-29 11:50:04 +02:00
iceman1001
791d9e09ac write check wrong, write returns number of bytes written, hence always larger than 0. Thanks to @mwalker33 for the fix 2024-07-21 11:37:47 +02:00
iceman1001
8ee0df159d fix output 2024-07-12 15:41:45 +02:00
iceman1001
30c4f0a924 text 2024-07-11 11:04:40 +02:00
iceman1001
05b50a6c26 fix #2418 - the tool mf_nonce_brute has in some odd cases when bruteforcing the last upper 16 bits a chance of actually decrypt the four bytes into a valid mifare classic protocol command with a valid ISO14443-a CRC. See github issue for example.\n We now bruteforce all 0xFFFF keyspace and keep track of how many candidates was found. The output has been improved to help user in this case too. 2024-07-11 10:57:19 +02:00
iceman1001
6e6d00505f added the tears_for_fears.py script by Pierre Granier 2024-06-06 14:45:06 +02:00
iceman1001
98acac3fc2 fix unused warning 2024-05-28 09:52:27 +02:00
iceman1001
d3d701f538 the generation of NrAr is used in the regression tests. I readded the old way and if you call the hitag2_gen_nRaR.py with five params, you get the nice commands instead 2024-05-27 15:08:49 +02:00
Philippe Teuwen
676c91baaf pk st25tn 2024-05-16 23:50:35 +02:00
Iceman
2b276cae1a
Merge pull request #2385 from henrygab/em4x70_add_tests
add `lf em 4x70 calc` and self-tests
2024-05-15 09:19:41 +02:00
Henry Gabryjelski
20711e7037 Add em4x70 tests 2024-05-14 21:06:35 -07:00
iceman1001
5fd4d7e774 fix const param, bitwiseboolean 2024-05-14 14:29:30 +02:00
iceman1001
480d5a3241 array init 2024-05-14 11:26:16 +02:00
Henry Gabryjelski
c40f4be3e6 re-enable broken hitag2 test 2024-05-06 07:59:41 -07:00
Henry Gabryjelski
9d33646b80 Disable broken hitag2 test so github actions work 2024-05-05 18:27:35 -07:00
Philippe Teuwen
455d4a9a74 key id 01? 2024-04-23 22:58:18 +02:00
Philippe Teuwen
5ca6d5c493 Update recover_pk.py 2024-04-23 22:51:47 +02:00
iceman1001
3ef3e3a63d update signature data 2024-04-23 02:16:01 +02:00
Benjamin DELPY
e6ad06a2c8
Update recover_pk.py with first TruST25 (ST) key
TruST25 (ST) - KeyID 0x04?
`curve=secp128r1, hash=sha256` - from block 63 in ST25TV, starting with KeyID?

Tested on multiple `ST25TV02KC` - `K04S` at block 63, signature in ... ASCII...

Signed-off-by: Benjamin DELPY <benjamin@gentilkiwi.com>
2024-04-23 01:11:05 +02:00
iceman1001
c8849af5e0 This is the major changes made to the HITAG2 commands. Its heavly based on RFIDLers implementation and its been converted to work with Proxmark3. Special thanks to @kevsecurity for his amazing implementations of the Gone in 360 Seconds paper by Roel, Flavio & Balasch. Thanks to @adamlaurie for his RFIDler project. It wouldnt been doable without it. 2024-04-22 16:20:24 +02:00
iceman1001
1b45112ad0 style 2024-04-22 09:40:50 +02:00
iceman1001
042ba20d58 style 2024-04-22 09:36:42 +02:00
iceman1001
67c14c5314 adapt regression tests 2024-04-22 09:21:55 +02:00
Jaka
c871e435e4 fix implicit use of time() 2024-04-18 09:40:00 +02:00
iceman1001
9a73e77d72 style 2024-04-11 22:08:25 +02:00
iceman1001
4e540053e9 style 2024-04-07 11:38:51 +02:00
iceman1001
ab2e3d5179 updated the OpenCL Headers from https://github.com/KhronosGroup/OpenCL-Headers/tree/main/CL. 2024-03-26 15:08:34 +01:00
iceman1001
529d57a181 style 2024-03-25 23:34:53 +01:00
iceman1001
140cc1d957 style 2024-03-25 23:33:44 +01:00