diff --git a/net-wireless/proxmark3/Manifest b/net-wireless/proxmark3/Manifest index 54da94d2c..72a2674cf 100644 --- a/net-wireless/proxmark3/Manifest +++ b/net-wireless/proxmark3/Manifest @@ -1,3 +1,2 @@ -DIST proxmark3-4.18341.tar.gz 31594493 BLAKE2B 8f0e1f7d69a1ebd339bdb412fe85437936b344f6c545e5747f35c0fd18e3b900388add22ed80d1113b73af0a5686eda04bcf40cee6411a14cbaeb90031339374 SHA512 af0f8d724b6e319be191b60da80edf14e3742218992c6ae6fcd8ad0aa7c26d24321f91f0d96172283708925c28e8b47919b292057aed41a51eb00c2fcb87cda2 DIST proxmark3-4.18994.tar.gz 31699671 BLAKE2B fadc6e0829da27b295ed83857372bf16e1dfde35bee2d6fc63d8c9071d29df8d1a5b15a7fb29d8da064b6634b48e1d31f34be8afeb9a70ba6c5d4d48d6e0e41b SHA512 718809522036ebd0de880c7dc3cc9c291eac62d3d67061f6f22b7d07be4850c952b23299c45324d2537594227f787e242bcfa741c7050f416a4666aaf87e1c19 DIST proxmark3-4.20142.tar.gz 31953315 BLAKE2B 31e973af7d99029e64b80ca54f4dd142ec3e93d96699b21ac0ac3b9b7faddf513e092311ce17d81aef4a5eb3f003beb3f3cbb620b84578929ed3f3cfae4147bc SHA512 cee17dcf875cd6227dc867e688cdb81616f329a7d8e4c9755c73dcdf7ecbc87f5414b54eca8561412e799c1341e490ba64f3f60293acfeb4887f32ce45d22ac0 diff --git a/net-wireless/proxmark3/metadata.xml b/net-wireless/proxmark3/metadata.xml index 3bf02f275..67648ef09 100644 --- a/net-wireless/proxmark3/metadata.xml +++ b/net-wireless/proxmark3/metadata.xml @@ -7,39 +7,8 @@ Use bluez to support connection to blueshark accessory - build and install the mfkey and nonce2key tools build firmware to update the proxmark3 hardware - build proxmark3 rdv4 specific firmware instead of generic build support for qt graphical scope interface - Load multiple standalone modes - HF 14a sniff to flashmem - HF 15693 sniff to flashmem - MIFARE Ultralight read/simulation - standalone 14a sniff with ULC/ULEV1/NTAG auth - standalone 14a based protocol - standalone Mifare ultra fast sniff/sim/clone - UID stealer - Emulates scanned 14a UID - iCLASS 4-1 mode sim/read and dump/loclass/glitch and config to flashmem - Read/simulate Legic Prime tags (RDV4: + save to flashmem) - Simulate Legic Prime tags - standalone Mifare sniff/clone - MIFARE Classic simulate - (default) Read and emulate MSD Visa cards - 14A relay over BT - IKEA Rothult ST25TA, Standalone Master Key Dump/Emulation - Read and emulate ISO15693 card UID - Multimode HF sniffer with optional flashmem and runtime select - standalone Mifare sniff/simulation - Simulate predefined EM4100 tags - Read/simulate/brute/clone EM4100 tags - Read/simulate/clone EM4100 tags - standalone HID corporate 1000 bruteforce - HID Facility Code bruteforce - LF HID / IOprox / AWID / EM4100 collector to flashmem - Nexwatch credentials detection mode - standalone HID ProxII bruteforce - standalone HID26 read/clone/sim - LF EM4x50 simulator/read standalone mode RfidResearchGroup/proxmark3