mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-02-14 03:03:14 +08:00
MOV: moved the try32/try64 attacks (mfkey32/mfkey64) into the nonce2key.c file CHG: added @marshmellow42 changes to hf mfu dump layout. ADD: an extra call to BigBuf_free in readcard.. just to make sure that it doesn't leak memory. ADD: expermimental call to "try32" for "hf mf sim x". |
||
---|---|---|
.. | ||
14araw.lua | ||
cmdline.lua | ||
dumptoemul.lua | ||
emul2dump.lua | ||
emul2html.lua | ||
formatMifare.lua | ||
hf_read.lua | ||
htmldump.lua | ||
mfkeys.lua | ||
mifare_autopwn.lua | ||
ndef_dump.lua | ||
parameters.lua | ||
remagic.lua | ||
test_t55x7_ask.lua | ||
test_t55x7_bi.lua | ||
test_t55x7_fsk.lua | ||
test_t55x7_psk.lua | ||
tnp3clone.lua | ||
tnp3dump.lua | ||
tnp3sim.lua | ||
tracetest.lua |