diff --git a/RFID/H10301 Bruteforce/H10301_BF.zip b/RFID/H10301 Bruteforce/H10301_BF.zip new file mode 100644 index 00000000..fdae17b6 Binary files /dev/null and b/RFID/H10301 Bruteforce/H10301_BF.zip differ diff --git a/RFID/H10301 Bruteforce/ReadMe.md b/RFID/H10301 Bruteforce/ReadMe.md new file mode 100644 index 00000000..da6d9137 --- /dev/null +++ b/RFID/H10301 Bruteforce/ReadMe.md @@ -0,0 +1,8 @@ +# H10301 Bruteforce (5p3ct3r) + +Used with the RFID Fuzzer, you can load these UUIDs to try _every_ possible one.
+It's large and will take awhile to go through. (More for fun and testing than actual use.) + +Simply extract the ZIP then copy the `H10301_BF.txt` file into the `rfidfuzzer` folder on your SD card. + +5p3ct3r has stated that he will provide the Python script used to create the file. \ No newline at end of file