iceman1001
6bc3ab1e44
chg: some pwd from forum
2019-03-25 14:39:49 +01:00
Iceman
5f2ecf67cd
Update default_pwd.dic
2019-01-21 00:02:33 +01:00
RFID Research Group
04b7860096
Update default_pwd.dic
...
from https://github.com/Proxmark/proxmark3/pull/735/
2018-12-07 17:36:50 +01:00
Chris
3690914405
another cloner
2018-10-19 21:52:23 +02:00
Chris
375aada810
more keys
2018-10-13 11:26:40 +02:00
iceman1001
4721e7e8a0
add: new found pwd. {@gentilkiwi)
2017-11-25 08:05:15 +01:00
iceman1001
8980e0ab66
some more keys
2017-07-11 18:31:53 +02:00
Iceman
d82de9223a
Update default_pwd.dic
2017-06-21 15:24:41 +02:00
Iceman
4d78c76faf
Update default_pwd.dic
...
added a new cloner pwd
2017-04-04 17:22:49 +02:00
iceman1001
e513cf8a31
chg: added a key
2017-02-13 10:59:03 +01:00
iceman1001
ea7ce7fb68
CHG: removed duplicates entries
2017-01-18 20:22:15 +01:00
iceman1001
62d0bbf62f
ADD: new found cloner pwd.
2016-12-20 09:25:02 +01:00
iceman1001
f74d0b89a2
added some keys
2015-12-05 22:18:42 +01:00
iceman1001
9984b1735a
CHG: updated helptext for lf t55xx bruteforce
...
ADD: a ROL function in util.c
ADD: two pwdgen functions in cmdhfmfu.c, call them with a 7byte UID and get a 4byte number back. Will see if it can be connected with the "hf mfu info" command, make data extraction easier later on.
ADD: added some more easy pwd in the dictionary file default_pwd.dic
2015-12-02 22:46:11 +01:00
iceman1001
060fdaf998
FIXES: the custom keys testloop now increases the read pwd :)
2015-12-01 16:44:53 +01:00
iceman1001
21865cda09
ADD: added the possibility to load a default pwd file to be used with the "lf t55xx bruteforce" command.
...
new option:
lf t55xx brutefore i default_pwd.dic - will load default pwds from file and test against tag.
2015-12-01 13:07:01 +01:00