Commit graph

15 commits

Author SHA1 Message Date
Iceman
5f2ecf67cd
Update default_pwd.dic 2019-01-21 00:02:33 +01:00
RFID Research Group
04b7860096
Update default_pwd.dic
from https://github.com/Proxmark/proxmark3/pull/735/
2018-12-07 17:36:50 +01:00
Chris
3690914405 another cloner 2018-10-19 21:52:23 +02:00
Chris
375aada810 more keys 2018-10-13 11:26:40 +02:00
iceman1001
4721e7e8a0 add: new found pwd. {@gentilkiwi) 2017-11-25 08:05:15 +01:00
iceman1001
8980e0ab66 some more keys 2017-07-11 18:31:53 +02:00
Iceman
d82de9223a Update default_pwd.dic 2017-06-21 15:24:41 +02:00
Iceman
4d78c76faf Update default_pwd.dic
added a new cloner pwd
2017-04-04 17:22:49 +02:00
iceman1001
e513cf8a31 chg: added a key 2017-02-13 10:59:03 +01:00
iceman1001
ea7ce7fb68 CHG: removed duplicates entries 2017-01-18 20:22:15 +01:00
iceman1001
62d0bbf62f ADD: new found cloner pwd. 2016-12-20 09:25:02 +01:00
iceman1001
f74d0b89a2 added some keys 2015-12-05 22:18:42 +01:00
iceman1001
9984b1735a CHG: updated helptext for lf t55xx bruteforce
ADD: a ROL function in util.c
ADD: two pwdgen functions in cmdhfmfu.c,  call them with a 7byte UID and get a 4byte number back. Will see if it can be connected with the "hf mfu info" command,  make data extraction easier later on.
ADD: added some more easy pwd in the dictionary file default_pwd.dic
2015-12-02 22:46:11 +01:00
iceman1001
060fdaf998 FIXES: the custom keys testloop now increases the read pwd :) 2015-12-01 16:44:53 +01:00
iceman1001
21865cda09 ADD: added the possibility to load a default pwd file to be used with the "lf t55xx bruteforce" command.
new option:
      lf t55xx brutefore i default_pwd.dic    -  will load default pwds from file and test against tag.
2015-12-01 13:07:01 +01:00