proxmark3
Flipper-IRDB
proxmark3 | Flipper-IRDB | |
---|---|---|
60 | 48 | |
3,465 | 2,159 | |
1.9% | - | |
9.9 | 9.7 | |
7 days ago | 7 days ago | |
C | ||
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
proxmark3
-
Flipper Zero: Multi-Tool Device for Geeks
I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]
To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).
High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).
[0] https://github.com/RfidResearchGroup/proxmark3
[1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...
[2] https://www.youtube.com/watch?v=zKOAywZqisc
- Proxmark3 Unleashes 'Faraday': A Leap Forward
-
Announcing 'Raccoon' - The Latest Proxmark3 Release!
🔗 https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
- vending machine nfc
-
Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
-
Unknown USB Device on Proxmark3 Easy
you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
-
Is it possible to copy an iClass card into a MiFare 1k card?
You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
- Question about sector 0 block 0
-
On-site Encrypted Access Control System?
Grab yourself a Proxmark3, read the instructions here, and you can extract your iClass elite key in a few seconds. You can pick up a PM3 easy for a few bucks.
-
Dangerous Things guide, errors during compile
I cloned whatever the latest commit was at https://github.com/RfidResearchGroup/proxmark3, which is what the guide on dangerous things suggests (where I bought my PM).
Flipper-IRDB
-
Flipper Zero: Multi-Tool Device for Geeks
Seems like there is at least a bit of interest [1] to convert lirc definitions [2], which is great, because there are so many of them. There even is a definition for my about 30 years old hifi! A really nice hack I saw is to send the code via something that reads lirc and capture it with a flipper in learning mode [3].
[1] https://forum.flipper.net/t/is-possible-to-convert-irplus-fi...
[2] https://lirc.sourceforge.net/remotes/
[3] https://github.com/Lucaslhm/Flipper-IRDB/pull/294
-
Flipper universal remote
If you're actually looking as bruteforcing IR, have a look at an example .IR file from the IRDB. They are just text files with a bunch of values in them. It would be pretty trivial to create a Python script that generates every possible IR signal, then upload that .IR file to the Flipper, although I would expect it would take a long time to run.
-
I just ordered a Flipper Zero and I want some suggestions on what I should do with it.
If you're feeling generous, capture codes from remotes and submit them to https://github.com/UberGuidoZ/Flipper or https://github.com/Lucaslhm/Flipper-IRDB
- Direct TV Remote
-
Hey Guys need ur help
Manufacturers will sometimes use the same IR codes across models. Try one of the files for Telefunken TVs in the IR database on Github - https://github.com/Lucaslhm/Flipper-IRDB/tree/main/TVs/Telefunken
- Flipper zero to find a tvs IR code? (lost remote)
-
IR learn remote not capturing signal
As you noted, the universal remote can turn your TV on and off, so it s manufacturer, you can try signals from the flipper IRDB and see if any of them work. From there, you can cobble together a remote that hopefully covers most or all of your device's functions.
-
I did it...
Here's the Flipper Zero IR config for the CLD-99 remote I created. It's not perfect but it's better than having no remote or having to walk across the room to press buttons on the device.
- Just got my first flipper today
- Rumba
What are some alternatives?
flipperzero-firmware - Flipper Zero firmware source code
awesome-flipperzero - 🐬 A collection of awesome resources for the Flipper Zero device.
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page
Flipper-IRDB - A collective of different IRs for the Flipper
miLazyCracker - Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
Flipper - Playground (and dump) of stuff I make or modify for the Flipper Zero
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
flipperzero-bruteforce - Brute force subghz fixed codes using flipper zero
ProxSpace - Proxmark III develoment environment for Windows
flipperzero-sesproject - Segger Embedded Studio project for building & debugging Flipper Zero firmware.
libnfc - Platform independent Near Field Communication (NFC) library
FlipperZeroCases - 3d Printable Flipper Zero Cases