proxmark3/client/scripts
2016-08-07 21:19:11 +02:00
..
14araw.lua
calc_ev1_it.lua
calc_mizip.lua ADD: added a lua script which calculates mifare keys based on a uid diversification 2016-05-06 10:19:15 +02:00
calypso.lua CHG: some calyspo stuff 2016-08-04 21:57:40 +02:00
cmdline.lua
didump.lua
dumptoemul-mfu.lua chg: added to print the author. 2016-06-20 13:31:51 +02:00
dumptoemul.lua chg: added to print the author. 2016-06-20 13:31:51 +02:00
e.lua
emul2dump.lua
emul2html.lua
formatMifare.lua
hf_read.lua
htmldump.lua CHG: just made the autopwn script main loop a bit more verbal 2016-05-10 07:40:27 +02:00
legic.lua Applied @icsom 's fixes from: b577582490 2016-06-22 09:33:21 +02:00
legic_buffer2card.lua ADD: Added three legic luascript from @iscom (Mosic) Great work! 2016-02-28 14:50:49 +01:00
Legic_clone.lua ADD: Added three legic luascript from @iscom (Mosic) Great work! 2016-02-28 14:50:49 +01:00
mfkeys.lua
mifare_autopwn.lua CHG: fixes to match the new arguments to the darkside attack (keytype A|B and blocknumber) in mifare_autopwn.lua script. 2016-08-07 21:19:11 +02:00
ndef_dump.lua
parameters.lua
remagic.lua CHG: added the possibility to "remagic" the new found Mifare Ultralight tags, which answers to chinese backdoor commands for uid change. 2016-05-15 19:27:04 +02:00
test_t55x7_ask.lua
test_t55x7_bi.lua
test_t55x7_fsk.lua
test_t55x7_psk.lua
tnp3clone.lua
tnp3dump.lua FIX: forgot a lua object for the call to ConvertAsciiToHex. Thanks @romaric for finding it. 2016-01-15 21:47:32 +01:00
tnp3sim.lua
tracetest.lua