2022-11-07 22:45:11 +00:00
|
|
|
# H10301 Bruteforce (Thanks [gh0st91](https://github.com/gh0st91/fz)!)
|
2022-11-07 22:23:44 +00:00
|
|
|
|
2022-11-07 22:47:51 +00:00
|
|
|
Used with the RFID Fuzzer, you can load these UIDs to try _every_ possible one.<br>
|
2022-11-07 23:17:15 +00:00
|
|
|
It's large and will take around 2 hours to finish. (More for fun and testing than actual use.)
|
2022-11-07 22:23:44 +00:00
|
|
|
|
|
|
|
Simply extract the ZIP then copy the `H10301_BF.txt` file into the `rfidfuzzer` folder on your SD card.
|
|
|
|
|
2022-11-07 23:17:15 +00:00
|
|
|
![H10301_BF](https://user-images.githubusercontent.com/57457139/200435371-2c66a140-5d9b-45fc-8bd7-92e385fa84a2.gif)
|
|
|
|
|
2022-11-07 22:45:11 +00:00
|
|
|
Github linked above includes the Python script used to create the TXT file.
|