No Description

SkeletonMan03 c6849a2ba8 Added LFRFID Protocols: Electra, Idteck, Gallagher, Nexwatch 1 year ago
.github 21e4ba7a61 add Codeowners 2 years ago
catalog c6849a2ba8 Added LFRFID Protocols: Electra, Idteck, Gallagher, Nexwatch 1 year ago
helpers 774002abbe Add the ability to save the key 2 years ago
icons 774002abbe Add the ability to save the key 2 years ago
lib c6849a2ba8 Added LFRFID Protocols: Electra, Idteck, Gallagher, Nexwatch 1 year ago
scenes 3b2cf0b664 Naming fixes 2 years ago
views 2ecfcd857d limit TD to fix crash and bump version 1 year ago
.gitignore 2ecfcd857d limit TD to fix crash and bump version 1 year ago
CHANGELOG.md c6849a2ba8 Added LFRFID Protocols: Electra, Idteck, Gallagher, Nexwatch 1 year ago
LICENSE b4b8a8f76f UDP License 2 years ago
README.md c6849a2ba8 Added LFRFID Protocols: Electra, Idteck, Gallagher, Nexwatch 1 year ago
application.fam 35877b498f remove deprecated 1 year ago
fuzzer.c 35877b498f remove deprecated 1 year ago
fuzzer_i.h be4400adda fixes part 2 2 years ago
todo.md 774002abbe Add the ability to save the key 2 years ago

README.md

Multi Fuzzer

Flipper Zero app for checking ibutton and RFID(125khz) readers .

Not meant for any illegal activity/purposes.

You can check your readers for vulnerabilities using the default UIDs and frequently used UIDs.

The application will also help to identify the "denial of service" vulnerability when providing an incorrect uid or when accessing the reader too often.

This is a completely remade app, visual style inspired by iButton fuzzer, the compatibility of user dictionaries is also preserved

Supported protocols

iButton

  • DS1990 (Dallas)
  • Metakom
  • Cyfral

LFRFID

  • EM4100
  • HIDProx
  • PAC/Stanley
  • H10301
  • IoProxXSF
  • Paradox
  • Indala26
  • Viking
  • Pyramid
  • Keri
  • Jablotron
  • Electra
  • Idteck
  • Gallagher
  • Nexwatch

Application Features

Main screen

  • Header - selected protocol
  • Menu - available attacks
    • Default Values - Using the dictionary from the app
    • Load UIDs from file - Loading a custom dictionary from an SD card
    • Load file - Loading UID from FlipperFormat key file with the ability to edit and further iterate over the selected byte
    • BFCustomer ID - Iterates over the selected byte with the remaining bytes equal to zero

Attack screen

  • Header - selected attack
  • 2nd line
    • Time delay (TD) - idle time between UID submissions
    • Emulation time (EmT) - transmission time of one UID
  • 3rd line - Prtocol name
  • 4th line - Current UID