فهرست منبع

Files for catalog

gid9798 2 سال پیش
والد
کامیت
1532c72f8c

+ 2 - 2
application.fam

@@ -13,7 +13,7 @@ App(
     stack_size=2 * 1024,
     fap_author="gid9798 xMasterX",
     fap_weburl="https://github.com/DarkFlippers/Multi_Fuzzer",
-    fap_version="1.0.0",
+    fap_version="1.0",
     fap_description="Fuzzer for ibutton readers",
     fap_icon="icons/ibutt_10px.png",
     fap_category="Tools",
@@ -42,7 +42,7 @@ App(
     stack_size=2 * 1024,
     fap_author="gid9798 xMasterX",
     fap_weburl="https://github.com/DarkFlippers/Multi_Fuzzer",
-    fap_version="1.0.0",
+    fap_version="1.0",
     fap_description="Fuzzer for lfrfid readers",
     fap_icon="icons/rfid_10px.png",
     fap_category="Tools",

+ 11 - 0
catalog/docs/ibtn/Changelog.md

@@ -0,0 +1,11 @@
+## v 1.0
+
+**Supported protocols**
+- DS1990 (Dallas)
+- Metakom
+- Cyfral
+
+**Suported attack**
+- Default Values
+- Load key file
+- Load UIDs from file

+ 29 - 0
catalog/docs/ibtn/README.md

@@ -0,0 +1,29 @@
+# Multi Fuzzer
+## Flipper Zero app for checking ibutton readers .
+
+**Not meant for any illegal activity/purposes.**
+
+You can check your readers for vulnerabilities using the default UIDs and frequently used UIDs.
+
+The application will also help to identify the "denial of service" vulnerability when providing an incorrect uid or when accessing the reader too often.
+
+## Supported protocols
+- DS1990 (Dallas)
+- Metakom
+- Cyfral
+
+# Application Features
+## Main screen
+- **Header** - selected protocol
+- **Menu** - available attacks
+    - **Default Values** - Using the dictionary from the app
+    - **Load UIDs from file** - Loading a custom dictionary from an SD card
+    - **Load file** - Loading UID from ***FlipperFormat*** key file with the ability to edit and further iterate over the selected byte
+
+## Attack screen
+- **Header** - selected attack
+- **2nd line**
+    - **Time delay (TD)** - idle time between UID submissions
+    - **Emulation time (EmT)** - transmission time of one UID
+- **3rd line** - Prtocol name
+- **4th line** - Current UID

+ 13 - 0
catalog/docs/rfid/Changelog.md

@@ -0,0 +1,13 @@
+## v 1.0
+
+**Supported protocols**
+- EM4100
+- HIDProx
+- PAC/Stanley
+- H10301
+
+**Suported attack**
+- Default Values
+- Load key file
+- Load UIDs from file
+- BFCustomer ID

+ 31 - 0
catalog/docs/rfid/README.md

@@ -0,0 +1,31 @@
+# Multi Fuzzer
+## Flipper Zero app for checking LF RFID readers .
+
+**Not meant for any illegal activity/purposes.**
+
+You can check your readers for vulnerabilities using the default UIDs and frequently used UIDs.
+
+The application will also help to identify the "denial of service" vulnerability when providing an incorrect uid or when accessing the reader too often.
+
+## Supported protocols
+- EM4100
+- HIDProx
+- PAC/Stanley
+- H10301
+
+# Application Features
+## Main screen
+- **Header** - selected protocol
+- **Menu** - available attacks
+    - **Default Values** - Using the dictionary from the app
+    - **Load UIDs from file** - Loading a custom dictionary from an SD card
+    - **Load file** - Loading UID from ***FlipperFormat*** key file with the ability to edit and further iterate over the selected byte
+    - **BFCustomer ID** - Iterates over the selected byte with the remaining bytes equal to zero
+
+## Attack screen
+- **Header** - selected attack
+- **2nd line**
+    - **Time delay (TD)** - idle time between UID submissions
+    - **Emulation time (EmT)** - transmission time of one UID
+- **3rd line** - Prtocol name
+- **4th line** - Current UID

BIN
catalog/screenshots/Attack_screen.png


BIN
catalog/screenshots/Field_editor.png


BIN
catalog/screenshots/Main_menu.png