X-Git-Url: http://cvs.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/blobdiff_plain/489c39c9a5e9046dc9438b4ec1c57b1feace1038..c728b2b4cf2ce9fe4eebf0e46d74ef8542e56c16:/CHANGELOG.md diff --git a/CHANGELOG.md b/CHANGELOG.md index 3b6882d0..b365dcf0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,8 @@ All notable changes to this project will be documented in this file. This project uses the changelog in accordance with [keepchangelog](http://keepachangelog.com/). Please use this to write notable changes, which is not the same as git commit log... ## [unreleased][unreleased] + - Added `lf guard clone/sim` (iceman) + - Added `lf pyramd clone/sim` (iceman) - trying to fix "hf 14b" command to be able to read CALYPSO card. (iceman) - `hf legic load`, it now loads faster and a casting bug is gone. (iceman) - Added `hf legic calccrc8` added a method to calculate the legic crc-8 value (iceman) @@ -20,6 +22,7 @@ This project uses the changelog in accordance with [keepchangelog](http://keepac - Updated the Reveng 1.30 sourcecode to 1.31 from Reveng projecthomepage (iceman) ### Added +- Added a LF ASK Sequence Terminator detection option to the standard ask demod - and applied it to `lf search u`, `lf t55xx detect`, and `data rawdemod am s` (marshmellow) - `lf awid bruteforce ` - Simple bruteforce attack against a AWID reader. - `lf t55xx bruteforce [i <*.dic>]` - Simple bruteforce attack to find password - (iceman and others) - `lf viking clone`- clone viking tag to t55x7 or Q5 from 4byte hex ID input