unleashed-firmware/applications/external/flipfrid
2023-06-02 15:14:32 +03:00
..
images Move plugins to external folder 2023-03-15 01:25:18 +03:00
scene Fix RFID Fuzzer and iButton Fuzzer Bugs 2023-04-23 01:57:38 +03:00
application.fam Fix APP_IDs to match new regex 2023-06-02 13:42:44 +03:00
flipfrid.c Fuzzers remove excessive free's 2023-05-05 16:09:06 +03:00
flipfrid.h Fix appid's pt2 2023-06-02 15:14:32 +03:00
LICENSE.md Move plugins to external folder 2023-03-15 01:25:18 +03:00
README.md Update rfid fuzzer readme 2023-05-11 02:58:28 +03:00
rfid_10px.png Move plugins to external folder 2023-03-15 01:25:18 +03:00

Flipfrid

Basic LFRFID Fuzzer.

Why

Flipfrid is a simple Rfid fuzzer using lfrfid protocols (125khz). Objective is to provide a simple to use fuzzer to test readers by emulating various cards.

  • EM4100 cards use a 1 byte customer id and 4 bytes card id.
  • HIDProx cards use a 2 byte customer id and 3 byte card id.

How

  1. Select the Protocol with the left and right arrows
  2. Select the Mode with the up and down arrows
  3. Set TD (Time delay) between ID switch if you need, or left it as is
  4. Click Start

Info

There are 4 Protocols:

  • EM4100
  • HIDProx
  • PAC/Stanley
  • H10301

There are 4 modes:

  • Default Values: Try factory/default keys and emulate one after the other.
  • BF customer id: An iteration from 0X00 to 0XFF on the first byte.
  • Load Dump file: Load an existing dump (.rfid) generated by Flipperzero, select an index and bruteforce from 0X00 to 0XFF;
  • Uids list: Iterate over an input text file (one uid per line) and emulate one after the other.

TODO :

  • Add second byte test to BF customer id