From fdefe5cba056c4d122e5277bf443232b01f8de1a Mon Sep 17 00:00:00 2001 From: iceman1001 Date: Thu, 21 Apr 2016 12:31:08 +0200 Subject: [PATCH] updates.. --- CHANGELOG.md | 5 +++++ README.md | 5 +++-- README.txt | 5 ++++- 3 files changed, 12 insertions(+), 3 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 22b2024b..d322acf3 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,11 @@ All notable changes to this project will be documented in this file. This project uses the changelog in accordance with [keepchangelog](http://keepachangelog.com/). Please use this to write notable changes, which is not the same as git commit log... ## [unreleased][unreleased] + - 'hf mf chk' speedup + - 'hf 14a/mf sim x" attack mode, now uses also moebius version of mfkey32 to try finding the key. + - 'hf 14a sim' Added emulation of Mifare cards with 10byte UID length. + - 'hf mf sim' Added emulation of Mifare cards with 10byte UID length. + - Added bitsliced bruteforce solver in 'hf mf hardnested' (azcid) - Added `lf guard clone/sim` (iceman) - Added `lf pyramd clone/sim` (iceman) - trying to fix "hf 14b" command to be able to read CALYPSO card. (iceman) diff --git a/README.md b/README.md index 19f21b7a..4416727d 100644 --- a/README.md +++ b/README.md @@ -60,8 +60,9 @@ Among the stuff is * A Bruteforce for AWID 26, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a AWID Reader. * A Bruteforce for HID, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a HID Reader. * Blaposts Crapto1 v3.3 - - * icsom's legic script and legic enhancements + * Icsom's legic script and legic enhancements + * Azcid's bitsliced bruteforce solver in 'hf mf hardnested' + --- Straight from the CHANGELOG diff --git a/README.txt b/README.txt index 077ff0f6..74566c0c 100644 --- a/README.txt +++ b/README.txt @@ -38,7 +38,10 @@ Among the stuff is * A Bruteforce for T55XX passwords against tag. * A Bruteforce for AWID 26, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a AWID Reader. - + * A Bruteforce for HID, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a HID Reader. + * Blaposts Crapto1 v3.3 + * Icsom's legic script and legic enhancements + * Azcid's bitsliced bruteforce solver in 'hf mf hardnested' Give me a hint, and I'll see if I can't merge in the stuff you have. -- 2.39.2