From 655d2c6e45040154e014bc74fdd0b25d3dd43172 Mon Sep 17 00:00:00 2001 From: UberGuidoZ <57457139+UberGuidoZ@users.noreply.github.com> Date: Mon, 7 Nov 2022 14:45:11 -0800 Subject: [PATCH] Update ReadMe.md --- RFID/H10301 Bruteforce/ReadMe.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/RFID/H10301 Bruteforce/ReadMe.md b/RFID/H10301 Bruteforce/ReadMe.md index da6d9137..6b865983 100644 --- a/RFID/H10301 Bruteforce/ReadMe.md +++ b/RFID/H10301 Bruteforce/ReadMe.md @@ -1,8 +1,8 @@ -# H10301 Bruteforce (5p3ct3r) +# H10301 Bruteforce (Thanks [gh0st91](https://github.com/gh0st91/fz)!) Used with the RFID Fuzzer, you can load these UUIDs to try _every_ possible one.
It's large and will take awhile to go through. (More for fun and testing than actual use.) Simply extract the ZIP then copy the `H10301_BF.txt` file into the `rfidfuzzer` folder on your SD card. -5p3ct3r has stated that he will provide the Python script used to create the file. \ No newline at end of file +Github linked above includes the Python script used to create the TXT file.