Explorar o código

Merge pull request #12 from H4ckd4ddy/rogue-version

Pull rogue version
Etienne Sellan %!s(int64=2) %!d(string=hai) anos
pai
achega
673d533714
Modificáronse 2 ficheiros con 5 adicións e 4 borrados
  1. 5 2
      application.fam
  2. 0 2
      sentry_safe.c

+ 5 - 2
application.fam

@@ -1,5 +1,5 @@
 App(
-    appid="GPIO_Sentry_Safe",
+    appid="gpio_sentry_safe",
     name="[GPIO] Sentry Safe",
     apptype=FlipperAppType.EXTERNAL,
     entry_point="sentry_safe_app",
@@ -8,4 +8,7 @@ App(
     order=40,
     fap_icon="safe_10px.png",
     fap_category="GPIO",
-)
+    fap_author="@H4ckd4ddy,
+    fap_version=(1, 0),
+    fap_description="App exploiting vulnerability to open any Sentry Safe and Master Lock electronic safe without any pin code via UART pins.",
+)

+ 0 - 2
sentry_safe.c

@@ -2,7 +2,6 @@
 #include <gui/gui.h>
 #include <input/input.h>
 #include <stdlib.h>
-#include <dolphin/dolphin.h>
 
 #include <furi_hal.h>
 
@@ -85,7 +84,6 @@ int32_t sentry_safe_app(void* p) {
     UNUSED(p);
 
     FuriMessageQueue* event_queue = furi_message_queue_alloc(8, sizeof(Event));
-    DOLPHIN_DEED(DolphinDeedPluginStart);
 
     SentryState* sentry_state = malloc(sizeof(SentryState));