WillyJL 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
..
assets 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
docs 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
icons 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
screenshots 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
.gitsubtree a12fd82f64 Add combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 8 ヶ月 前
LICENSE a12fd82f64 Add combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 8 ヶ月 前
README.md 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
application.fam 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
combo_cracker.c 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前
combo_cracker.fap 14db79d52d Merge combo_cracker from https://github.com/CharlesTheGreat77/ComboCracker-FZ 7 ヶ月 前

README.md

ComboCracker-FZ

Combo Cracker is an on-the-go combination lock cracking tool for the Flipper Zero, inspired by security researcher Samy Kamkar’s work on the mechanical vulnerabilities in Master Lock combination padlocks.

Using a clever approach/exploit and feedback from the lock’s dial resistance, you can determine the combination in just 8 attempts or less — instead of the known issues which deduce such to 100 or so brute-force attempts.

📚 Background: Samy Kamkar's Research

Samy Kamkar discovered a weakness in many standard Master Lock combination padlocks that allows their 3-digit codes to be deduced using subtle physical feedback from the lock's mechanism.

🕵️ Side-Channel Attack

This method is a type of mechanical side-channel attack, as described by Samy Kamkar. Instead of attacking the lock by brute force, it extracts hidden information by:

  • Applying tension to the shackle,
  • Observing how the dial behaves at certain positions,
  • Measuring subtle differences in movement (i.e. which "gate" feels freer),
  • Exploiting the predictable mechanics of the lock.

By analyzing this side-channel data, we can infer the internal state of the lock and reduce the combination space from thousands to just a handful of options — all without damaging or opening the lock first.

Kamkar's technique reduces the problem space dramatically — from over 60,000 combinations down to just 8 or fewer.

🔗 Learn more in Samy's video: Cracking Master Locks with Samy Kamkar

🔬 Original write-up & Web Tool
Samy Kamkar's Page

🧠 How It Works

This Flipper Zero app allows you to input physical resistance value(s) and "lock positions" observed from turning the lock dial. The app uses that data to run Kamkar’s approach to output a short list of combinations. You can find information about how such works by watching Samy Kamkar's wonderful video(s)!

Usage 🔧

UP/DOWN - Select the Lock/Resistance position(s)
LEFT/RIGHT - Increment/Decrease the position
ABOUT -> RIGHT - Brief description

Main Menu 📺

Main-Menu

Combination Output 🔒

Combo Output

🙏 Credits & Acknowledgement:

Inspired by: Samy Kamkar’s lock cracking research

Built for: Flipper Zero

Roadmap

Update the input to allow "press and hold" to increase/decrease the value(s).