Logo
Explore Help
Sign In
dash/proxmark3
1
0
Fork 0
You've already forked proxmark3
Code Issues Pull Requests Packages Projects Releases Wiki Activity
2,598 Commits 7 Branches 1 Tag
84bdbc19174eaf54db337ef0470e35cf45dc8e9d
Commit Graph

8 Commits

Author SHA1 Message Date
iceman1001
ea1c1ca6f8 CHG: 'analyse hid' added @holiman 's permute functions to the output to verify 2017-01-03 19:32:24 +01:00
iceman1001
09bb01c73d ADD: "analyse hid" - new function that implements the 'heart of darkness' hid/iclass permute function. Its converted from the php-solution found in the paper to C. Ref: https://github.com/akw0088/HID-Card-Copy/blob/master/key-permutation/permute.php 2016-11-17 18:20:44 +01:00
iceman1001
b403c30091 FIX: the time_t calls under mingw needs a #define _USE_32BIT_TIME_T 1 to be correct. It seems to work in "hf mf mifare" but not in "hf mf hardnested" 2016-10-29 21:42:46 +02:00
iceman1001
16658b1ff1 CHG: moved some TEA crypto stuff from 14b into analyse. 2016-08-07 21:08:17 +02:00
iceman1001
df007486f5 ADD: @donwan581 select keytype for the darkside attack. 2016-08-04 21:51:26 +02:00
iceman1001
53b3c3e816 ADD: Added some new analyse functions like CHKSUM ADD/SUBTRACKT with one's complement 2016-07-28 21:47:52 +02:00
iceman1001
5558d935bd ADD: added the skeleton for analysing dates in a given byte array. 2016-06-13 21:55:52 +02:00
iceman1001
812513bf90 ADD: Added a new main command group "analyse", first one is the find the missing XOR in a LCR, it was a python script under /tools/xorfind.py 2016-05-10 15:30:46 +02:00
Powered by Gitea
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API