This project uses the changelog in accordance with [keepchangelog](http://keepachangelog.com/). Please use this to write notable changes, which is not the same as git commit log...
## [unreleased][unreleased]
+ - 'hf mf chk' speedup
+ - 'hf 14a/mf sim x" attack mode, now uses also moebius version of mfkey32 to try finding the key.
+ - 'hf 14a sim' Added emulation of Mifare cards with 10byte UID length.
+ - 'hf mf sim' Added emulation of Mifare cards with 10byte UID length.
+ - Added bitsliced bruteforce solver in 'hf mf hardnested' (azcid)
- Added `lf guard clone/sim` (iceman)
- Added `lf pyramd clone/sim` (iceman)
- trying to fix "hf 14b" command to be able to read CALYPSO card. (iceman)
* A Bruteforce for AWID 26, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a AWID Reader.
* A Bruteforce for HID, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a HID Reader.
* Blaposts Crapto1 v3.3
-
- * icsom's legic script and legic enhancements
+ * Icsom's legic script and legic enhancements
+ * Azcid's bitsliced bruteforce solver in 'hf mf hardnested'
+
---
Straight from the CHANGELOG
* A Bruteforce for T55XX passwords against tag.
* A Bruteforce for AWID 26, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a AWID Reader.
-
+ * A Bruteforce for HID, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a HID Reader.
+ * Blaposts Crapto1 v3.3
+ * Icsom's legic script and legic enhancements
+ * Azcid's bitsliced bruteforce solver in 'hf mf hardnested'
Give me a hint, and I'll see if I can't merge in the stuff you have.