pentoo-overlay/net-wireless/proxmark3/metadata.xml
2024-02-19 12:15:55 -05:00

47 lines
3.1 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="person">
<email>zerochaos@gentoo.org</email>
<name>Rick Farina</name>
</maintainer>
<use>
<flag name="bluez">Use bluez to support connection to blueshark accessory</flag>
<flag name="deprecated">build and install the mfkey and nonce2key tools</flag>
<flag name="firmware">build firmware to update the proxmark3 hardware</flag>
<flag name="pm3rdv4">build proxmark3 rdv4 specific firmware instead of generic</flag>
<flag name="qt">build support for qt graphical scope interface</flag>
<flag name="standalone-lf-samyrun">standalone HID26 read/clone/sim</flag>
<flag name="standalone-lf-proxbrute">standalone HID ProxII bruteforce</flag>
<flag name="standalone-lf-hidbrute">standalone HID corporate 1000 bruteforce</flag>
<flag name="standalone-hf-young">standalone Mifare sniff/simulation</flag>
<flag name="standalone-hf-mattyrun">standalone Mifare sniff/clone</flag>
<flag name="standalone-hf-cardhopper">standalone 14a based protocol</flag>
<flag name="standalone-hf-colin">standalone Mifare ultra fast sniff/sim/clone</flag>
<flag name="standalone-hf-bog">standalone 14a sniff with ULC/ULEV1/NTAG auth</flag>
<flag name="standalone-dankarmulti">Load multiple standalone modes</flag>
<flag name="standalone-hf-14asniff">HF 14a sniff to flashmem</flag>
<flag name="standalone-hf-15sniff">HF 15693 sniff to flashmem</flag>
<flag name="standalone-hf-aveful">MIFARE Ultralight read/simulation</flag>
<flag name="standalone-hf-craftbyte">UID stealer - Emulates scanned 14a UID</flag>
<flag name="standalone-hf-iceclass">iCLASS 4-1 mode sim/read and dump/loclass/glitch and config to flashmem</flag>
<flag name="standalone-hf-legic">Read/simulate Legic Prime tags (RDV4: + save to flashmem)</flag>
<flag name="standalone-hf-legicsim">Simulate Legic Prime tags</flag>
<flag name="standalone-hf-mfcsim">MIFARE Classic simulate</flag>
<flag name="standalone-hf-msdsal">(default) Read and emulate MSD Visa cards</flag>
<flag name="standalone-hf-reblay">14A relay over BT</flag>
<flag name="standalone-hf-tcprst">IKEA Rothult ST25TA, Standalone Master Key Dump/Emulation</flag>
<flag name="standalone-hf-tmudford">Read and emulate ISO15693 card UID</flag>
<flag name="standalone-hf-unisniff">Multimode HF sniffer with optional flashmem and runtime select</flag>
<flag name="standalone-lf-em4100emul">Simulate predefined EM4100 tags</flag>
<flag name="standalone-lf-em4100rswb">Read/simulate/brute/clone EM4100 tags</flag>
<flag name="standalone-lf-em4100rwc">Read/simulate/clone EM4100 tags</flag>
<flag name="standalone-lf-hidfcbrute">HID Facility Code bruteforce</flag>
<flag name="standalone-lf-icehid">LF HID / IOprox / AWID / EM4100 collector to flashmem</flag>
<flag name="standalone-lf-nexid">Nexwatch credentials detection mode</flag>
<flag name="standalone-lf-tharexde">LF EM4x50 simulator/read standalone mode</flag>
</use>
<upstream>
<remote-id type="github">RfidResearchGroup/proxmark3</remote-id>
</upstream>
</pkgmetadata>