proxmark3/client/scripts
2017-01-25 08:40:55 +01:00
..
14araw.lua
calc_ev1_it.lua
calc_mizip.lua ADD: added a lua script which calculates mifare keys based on a uid diversification 2016-05-06 10:19:15 +02:00
calypso.lua CHG: some calyspo stuff 2016-08-04 21:57:40 +02:00
cmdline.lua
didump.lua
dumptoemul-mfu.lua chg: added to print the author. 2016-06-20 13:31:51 +02:00
dumptoemul.lua chg: added to print the author. 2016-06-20 13:31:51 +02:00
e.lua
emul2dump.lua
emul2html.lua
formatMifare.lua
hard.lua CHG: added a check if err variable is NIL. 2016-11-22 11:55:23 +01:00
hard_autopwn.lua still wrong... 2017-01-25 08:40:55 +01:00
hf_read.lua
htmldump.lua CHG: just made the autopwn script main loop a bit more verbal 2016-05-10 07:40:27 +02:00
legic.lua Applied @icsom 's fixes from: b577582490 2016-06-22 09:33:21 +02:00
legic_buffer2card.lua
Legic_clone.lua
mfkeys.lua FIX: Since some changes in "hf mf chk" usbcommand package, this script has not been working. It now calls and gets the results back from the device. 2016-10-17 17:20:33 +02:00
mifare_autopwn.lua textual suger 2016-10-19 21:26:56 +02:00
ndef_dump.lua
parameters.lua
remagic.lua CHG: added the possibility to "remagic" the new found Mifare Ultralight tags, which answers to chinese backdoor commands for uid change. 2016-05-15 19:27:04 +02:00
test_t55x7_ask.lua
test_t55x7_bi.lua
test_t55x7_fsk.lua
test_t55x7_psk.lua
tnp3clone.lua
tnp3dump.lua
tnp3sim.lua
tracetest.lua