Willy-JL 4c8a2add22 Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 1 anno fa
..
.github 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
catalog 5c78e5417d Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 2 anni fa
helpers 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
icons 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
lib eadb979f93 Port merge fixes from firmware repo 2 anni fa
resources_ibtn c91d9d9dce Apps bundled resources 2 anni fa
resources_rfid c91d9d9dce Apps bundled resources 2 anni fa
scenes 07bc252f37 Update to new icons 2 anni fa
views 4c8a2add22 Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 1 anno fa
.gitignore 4c8a2add22 Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 1 anno fa
.gitsubtree f5a64c96a8 Add trailing subdir to subtree remote files 2 anni fa
CHANGELOG.md 4c8a2add22 Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 1 anno fa
LICENSE 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
README.md 5c78e5417d Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 2 anni fa
application.fam 4c8a2add22 Merge multi_fuzzer from https://github.com/DarkFlippers/Multi_Fuzzer 1 anno fa
fuzzer.c 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
fuzzer_i.h 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
ibutt_10px.png 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa
todo.md 2c8ef60bea Add 'multi_fuzzer/' from commit 'bc1f4b0945792e2442d32e65b31aa7f989b17b24' 2 anni fa

README.md

Multi Fuzzer

Flipper Zero app for checking ibutton and RFID(125khz) readers .

Not meant for any illegal activity/purposes.

You can check your readers for vulnerabilities using the default UIDs and frequently used UIDs.

The application will also help to identify the "denial of service" vulnerability when providing an incorrect uid or when accessing the reader too often.

This is a completely remade app, visual style inspired by iButton fuzzer, the compatibility of user dictionaries is also preserved

Supported protocols

iButton

  • DS1990 (Dallas)
  • Metakom
  • Cyfral

LFRFID

  • EM4100
  • HIDProx
  • PAC/Stanley
  • H10301
  • IoProxXSF
  • Paradox
  • Indala26
  • Viking
  • Pyramid
  • Keri
  • Jablotron

Application Features

Main screen

  • Header - selected protocol
  • Menu - available attacks
    • Default Values - Using the dictionary from the app
    • Load UIDs from file - Loading a custom dictionary from an SD card
    • Load file - Loading UID from FlipperFormat key file with the ability to edit and further iterate over the selected byte
    • BFCustomer ID - Iterates over the selected byte with the remaining bytes equal to zero

Attack screen

  • Header - selected attack
  • 2nd line
    • Time delay (TD) - idle time between UID submissions
    • Emulation time (EmT) - transmission time of one UID
  • 3rd line - Prtocol name
  • 4th line - Current UID