Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
 
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
the list that was in 2.1.0 release starting with hf mfu commands (mostly remade):
hf mfu dump k <key> l n <filename w/o .bin>       (remade)
  Options :
  k <key> : (optional) key for authentication [UL-C 16bytes, EV1/NTAG 4bytes]
  l       : (optional) swap entered key's endianness
  n <FN > : filename w/o .bin to save the dump as
  p <Pg > : starting Page number to manually set a page to start the dump at
  q <qty> : number of Pages to manually set how many pages to dump
   sample : hf mfu dump
          : hf mfu dump n myfile
          : hf mfu dump k 00112233445566778899AABBCCDDEEFF
          : hf mfu dump k AABBCCDDDhf mfu rdbl b <block number> k <key> l            (remade)
  Options:
  b <no>  : block to read
  k <key> : (optional) key for authentication [UL-C 16bytes, EV1/NTAG 4bytes]
  l       : (optional) swap entered key's endianness
   sample : hf mfu rdbl b 0
          : hf mfu rdbl b 0 k 00112233445566778899AABBCCDDEEFF
          : hf mfu rdbl b 0 k AABBCCDDDhf mfu wrbl b <block number> d <data> k <key> l         (remade)
  Options:
  b <no>   : block to write
  d <data> : block data - (8 hex symbols)
  k <key>  : (optional) key for authentication [UL-C 16bytes, EV1/NTAG 4bytes]
  l        : (optional) swap entered key's endianness
    sample : hf mfu wrbl b 0 d 01234567
           : hf mfu wrbl b 0 d 01234567 k AABBCCDDDproxmark3> hf mfu info h
It gathers information about the tag and tries to detect what kind it is.
Sometimes the tags are locked down, and you may need a key to be able to read the information
The following tags can be identified:
Ultralight, Ultralight-C, Ultralight EV1, NTAG 203, NTAG 210,
NTAG 212, NTAG 213, NTAG 215, NTAG 216, NTAG I2C 1K & 2K
my-d, my-d NFC, my-d move, my-d move NFC
Usage:  hf mfu info k <key> l
  Options :
  k <key> : (optional) key for authentication [UL-C 16bytes, EV1/NTAG 4bytes]
  l       : (optional) swap entered key's endianness
   sample : hf mfu info
          : hf mfu info k 00112233445566778899AABBCCDDEEFF
          : hf mfu info k AABBCCDDDREMOVED:
hf mfu crdbl
hf mfu cwrbl  (now integrated into wrbl)t55xx command changes: - did these make it in 2.0?
lf t55xx config [d <demodulation>] [i 1] [o <offset>]
Options:
       h                        This help
       b <8|16|32|40|50|64|100|128>     Set bitrate
       d <FSK|FSK1|FSK1a|FSK2|FSK2a|ASK|PSK1|PSK2|NZ|BI|BIa>  Set demodulation FSK / ASK / PSK / NZ / Biphase / Biphase A
       i [1]                            Invert data signal, defaults to normal
       o [offset]                       Set offset, where data should start decode in bitstream
Examples:
      lf t55xx config d FSK          - FSK demodulation
      lf t55xx config d FSK i 1      - FSK demodulation, inverse data
      lf t55xx config d FSK i 1 o 3  - FSK demodulation, inverse data, offset=3,start from position 3 to decode datalf t55xx detect    (detect t55xx chip and auto configure)
lf t55xx readblock  REMOVED
lf t55xx writeblock REMOVED
lf t55xx writeblockPWD   REMOVED
lf t55xx readblockPWD   REMOVED
lf t55xx readtrace     REMOVEDUsage:  lf t55xx write <block> <data> [password]
     <block>, block number to write. Between 0-7
     <data>,  4 bytes of data to write (8 hex characters)
     [password], OPTIONAL password 4bytes (8 hex characters)
Examples:
      lf t55xx write 3 11223344           - write 11223344 to block 3
      lf t55xx write 3 11223344 feedbeef  - write 11223344 to block 3 password feedbeefUsage:  lf t55xx read <block> <password>
     <block>, block number to read. Between 0-7
     <password>, OPTIONAL password (8 hex characters)
Examples:
      lf t55xx read 0           - read data from block 0
      lf t55xx read 0 feedbeef  - read data from block 0 password feedbeefUsage:  lf t55xx trace [1]
     [graph buffer data], if set, use Graphbuffer otherwise read data from tag
Examples:
      lf t55xx trace
      lf t55xx trace 1Usage:  lf t55xx info [1]
     [graph buffer data], if set, use Graphbuffer otherwise read data from tag.
Examples:
      lf t55xx info
      lf t55xx info 1Usage:  lf t55xx dump <password>
     <password>, OPTIONAL password 4bytes (8 hex symbols)
Examples:
      lf t55xx dump
      lf t55xx dump feedbeefOther changes:
hf search         (searches for known hf tags near antenna and outputs found type)
data psknexwatchdemod   (Demodulate a NexWatch tag (nexkey, quadrakey) (PSK1) from GraphBuffer)
data printdemodbuffer x o <offset>
  Options:
       h          This help
       x          output in hex (omit for binary output)
       o <offset> enter offset in # of bitshf 14b code
hf 14b demod - REMOVED
hf 14b read - REMOVED
hf 14b simlisten - REMOVED
hf epa preplay <mse> <get> <map> <pka> <ma> Perform PACE protocol by replaying given APDUs  (by Frederik Möllers)also not sure which of the new lf commands didn't make it into 2.0.0 so see: http://www.proxmark.org/forum/viewtopic.php?id=2260
CODE still unreleased:
data fdxbdemod     (Demodulate a FDX-B ISO11784/85 Biphase tag from GraphBuffer)
hf 14b info          (attempts to read various 14b tags and output type/uid/any other info that can be gathered)
hf 14b reader      (attempts to read various 14b tags and output type/uid)
hf 14b write CHANGED TO hf 14b sriwrite
hf 14b raw (added -s option to send REQB and ATTRIB cmd prior to next raw command)
(hf search now also searches for 14b)reveng - not yet committed:
reveng -h
CRC RevEng, an arbitrary-precision CRC calculator and algorithm finder
Usage:  reveng  -cdDesvhu? [-bBfFlLMrStVXyz]
                [-a BITS] [-A OBITS] [-i INIT] [-k KPOLY] [-m MODEL]
                [-p POLY] [-P RPOLY] [-q QPOLY] [-w WIDTH] [-x XOROUT]
                [STRING...]
Options:
        -a BITS         bits per character (1 to 32)
        -A OBITS        bits per output character (1 to 32)
        -i INIT         initial register value
        -k KPOLY        generator in Koopman notation (implies WIDTH)
        -m MODEL        preset CRC algorithm
        -p POLY         generator or search range start polynomial
        -P RPOLY        reversed generator polynomial
        -q QPOLY        search range end polynomial
        -w WIDTH        register size, in bits
        -x XOROUT       final register XOR value
Modifier switches:
        -b big-endian CRC               -B big-endian CRC output
        -f read files named in STRINGs  -F find presets less quickly
        -l little-endian CRC            -L little-endian CRC output
        -M non-augmenting algorithm     -r right-justified output
        -S print spaces between chars   -t left-justified output
        -V reverse algorithm only       -X print uppercase hex
        -y low bytes first in files     -z raw binary STRINGs
Mode switches:
        -c calculate CRCs               -d dump algorithm parameters
        -D list preset algorithms       -e echo (and reformat) input
        -s search for algorithm         -v calculate reversed CRCs
        -g search for alg given hex+crc -h | -u | -? show this help
Common Use Examples:
           reveng -g 01020304e3
              Searches for a known/common crc preset that computes the crc
              on the end of the given hex string
           reveng -w 8 -s 01020304e3 010204039d
              Searches for any possible 8 bit width crc calc that computes
              the crc on the end of the given hex string(s)
           reveng -m CRC-8 -c 01020304
              Calculates the crc-8 of the given hex string
           reveng -D
              Outputs a list of all known/common crc models with their
              preset values
Copyright (C) 2010, 2011, 2012, 2013, 2014, 2015  Gregory Cook
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Version 1.3.0                             <http://reveng.sourceforge.net/>Last edited by marshmellow (2015-06-30 05:41:39)
You run it with samples in the graphbuffer.
updated my command list posting...
Info will output more details (if we know them)