unleashed-firmware/applications/plugins/flipfrid
MX 28eb4d1060
Massive plugins refactoring
Not full refactoring, only small issues is fixed and moved all plugins to furi mutex instead of valuemutex

Many small issues was found and fixed due mutex upgrade

OFW removed 60 lines of code and it was painful
2023-03-08 00:18:23 +03:00
..
images icons upgrade, keeloq fix, api bump 2022-10-28 18:32:52 +03:00
scene RFID and iButton fuzzer fixes 2022-12-10 04:36:44 +03:00
application.fam icons upgrade, keeloq fix, api bump 2022-10-28 18:32:52 +03:00
flipfrid.c Massive plugins refactoring 2023-03-08 00:18:23 +03:00
flipfrid.h Massive plugins refactoring 2023-03-08 00:18:23 +03:00
LICENSE.md Merge branch 'fz-dev' into dev 2022-09-14 21:04:04 +03:00
README.md adding support for HIDProx, updating the UI to switch between protocols 2022-09-20 11:45:16 -07:00
rfid_10px.png update api, add icons, fix picopass again 2022-09-15 01:14:55 +03:00

Flipfrid

Basic EM4100 and HIDProx Fuzzer.

Why

Flipfrid is a simple Rfid fuzzer using EM4100 protocol (125khz). Objective is to provide a simple to use fuzzer to test readers by emulating various cards.

  • EM4100 cards use a 1 byte customer id and 4 bytes card id.
  • HIDProx cards use a 2 byte customer id and 3 byte card id.

How

  1. Select the Protocol with the left and right arrows
  2. Select the Mode with the up and down arrows

Info

There are 2 Protocols:

  • EM4100
  • HIDProx

There are 4 modes:

  • Default Values: Try factory/default keys and emulate one after the other.
  • BF customer id: An iteration from 0X00 to 0XFF on the first byte.
  • Load Dump file: Load an existing dump (.rfid) generated by Flipperzero, select an index and bruteforce from 0X00 to 0XFF;
  • Uids list: Iterate over an input text file (one uid per line) and emulate one after the other.

TODO :

  • blank screen on back press
  • Add second byte test to BF customer id