Sen descrición

gid9798 961708444f Fixed memory leak in Load_UIDs attack %!s(int64=2) %!d(string=hai) anos
.github 21e4ba7a61 add Codeowners %!s(int64=2) %!d(string=hai) anos
helpers 3bcb6994ec Pause v2 & some fixes %!s(int64=2) %!d(string=hai) anos
icons aab8be301e Start as a uFBT project %!s(int64=2) %!d(string=hai) anos
lib 961708444f Fixed memory leak in Load_UIDs attack %!s(int64=2) %!d(string=hai) anos
scenes 24ef3ca1c4 Made "load key file" protocol independent, fix some error %!s(int64=2) %!d(string=hai) anos
views 3bcb6994ec Pause v2 & some fixes %!s(int64=2) %!d(string=hai) anos
.gitignore aab8be301e Start as a uFBT project %!s(int64=2) %!d(string=hai) anos
LICENSE b4b8a8f76f UDP License %!s(int64=2) %!d(string=hai) anos
README.md 3e0398df34 add Readme %!s(int64=2) %!d(string=hai) anos
application.fam 7f09c77b13 Fix fap version & add URL %!s(int64=2) %!d(string=hai) anos
fuzzer.c aab8be301e Start as a uFBT project %!s(int64=2) %!d(string=hai) anos
fuzzer_i.h aab8be301e Start as a uFBT project %!s(int64=2) %!d(string=hai) anos
todo.md 740ff232f0 Upd ToDo %!s(int64=2) %!d(string=hai) anos

README.md

Multi Fuzzer

Flipper Zero app for checking ibutton and RFID(125khz) readers .

Not meant for any illegal activity/purposes.

You can check your readers for vulnerabilities using the default UIDs and frequently used UIDs.

The application will also help to identify the "denial of service" vulnerability when providing an incorrect uid or when accessing the reader too often.

This is a completely remade app, visual style inspired by iButton fuzzer, the compatibility of user dictionaries is also preserved

Supported protocols

iButton

  • DS1990 (Dallas)
  • Metakom
  • Cyfral

LFRFID

  • EM4100
  • HIDProx
  • PAC/Stanley
  • H10301

Application Features

Main screen

  • Header - selected protocol
  • Menu - available attacks
    • Default Values - Using the dictionary from the app
    • Load UIDs from file - Loading a custom dictionary from an SD card
    • Load file - Loading UID from FlipperFormat key file with the ability to edit and further iterate over the selected byte
    • BFCustomer ID - Iterates over the selected byte with the remaining bytes equal to zero

Attack screen

  • Header - selected attack
  • 2nd line
    • Time delay (TD) - idle time between UID submissions
    • Emulation time (EmT) - transmission time of one UID
  • 3rd line - Prtocol name
  • 4th line - Current UID