From 2c7d72b11bc3dc3c4459010750870515971c4b02 Mon Sep 17 00:00:00 2001
From: UberGuidoZ <57457139+UberGuidoZ@users.noreply.github.com>
Date: Tue, 20 Dec 2022 22:58:40 -0800
Subject: [PATCH 1/4] Pulling in RRG updates
---
NFC/mf_classic_dict/mf_classic_dict_user.nfc | 18 +++++++++++++++++-
1 file changed, 17 insertions(+), 1 deletion(-)
diff --git a/NFC/mf_classic_dict/mf_classic_dict_user.nfc b/NFC/mf_classic_dict/mf_classic_dict_user.nfc
index 287a2f2a..51a40722 100644
--- a/NFC/mf_classic_dict/mf_classic_dict_user.nfc
+++ b/NFC/mf_classic_dict/mf_classic_dict_user.nfc
@@ -1,4 +1,4 @@
-# Last update Nov 30, 2022
+# Last update Dec 20, 2022
# -----------------------
# MIFARE DEFAULT KEYS
# -- ICEMAN FORK VERSION --
@@ -2318,6 +2318,22 @@ A00003000057
#
# Random Hotel A key sec 0 blk 3 - Hoist Group lock
A2CA48CA4C05
+#
# Chelsea Harbour Hotel London by Cazagen
485242F22BE0
2A2C13CC242A
+#
+# Transport system Uruguay - STM
+# Shared key - sec 0 blk 3
+D144BD193063
+#
+# Data from http://www.proxmark.org/forum/viewtopic.php?pid=45659#p45659
+3515AE068CAD
+#
+# Keys Catering
+6A0D531DA1A7
+4BB29463DC29
+#
+# Keys Swim
+8627C10A7014
+453857395635
From 615aca37df2e723ba5be3f6ebd99e2a6fdf5db3d Mon Sep 17 00:00:00 2001
From: UberGuidoZ <57457139+UberGuidoZ@users.noreply.github.com>
Date: Wed, 21 Dec 2022 12:34:06 -0800
Subject: [PATCH 2/4] Update ReadMe.md
---
Hardware_Troubleshooting/ReadMe.md | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/Hardware_Troubleshooting/ReadMe.md b/Hardware_Troubleshooting/ReadMe.md
index 11e84e8b..c3dd7443 100644
--- a/Hardware_Troubleshooting/ReadMe.md
+++ b/Hardware_Troubleshooting/ReadMe.md
@@ -13,6 +13,13 @@ If your flipper is having issues, such as the common battery issue (only works w
Issues with stripped screws appears to be common. Be careful and use a quality screwdriver and/or bits!
If you need to replace a screw, [here are the dimensions](https://user-images.githubusercontent.com/57457139/174870632-501c9aad-ded6-46b5-8618-ba4aa8efa1e4.png) of them for replacement. (Told they are Torx M1.8 x 9mm)
+# Adding an external antenna
+
+Following the above, when you have your Flipper apart, you'll see the little "cut out corner" by the ESP32.
+Add or move this resister to add an external antenna:
+
+![Antenna](https://user-images.githubusercontent.com/57457139/208997871-a667b88b-fd31-412d-8a1e-fabb17223a96.jpg)
+
-----
## Donation Information
From c1d78a74d00b49b46bd8d0682d1ea8f7efcb7aec Mon Sep 17 00:00:00 2001
From: UberGuidoZ <57457139+UberGuidoZ@users.noreply.github.com>
Date: Wed, 21 Dec 2022 13:56:33 -0800
Subject: [PATCH 3/4] Appears to have been blocked by D&B
---
NFC/Fun_Files/Dave_and_Busters.nfc | 41 ------------------------------
1 file changed, 41 deletions(-)
delete mode 100644 NFC/Fun_Files/Dave_and_Busters.nfc
diff --git a/NFC/Fun_Files/Dave_and_Busters.nfc b/NFC/Fun_Files/Dave_and_Busters.nfc
deleted file mode 100644
index d1eb9399..00000000
--- a/NFC/Fun_Files/Dave_and_Busters.nfc
+++ /dev/null
@@ -1,41 +0,0 @@
-Filetype: Flipper NFC device
-Version: 2
-# Nfc device type can be UID, Mifare Ultralight, Mifare Classic, Bank card
-Device type: Mifare Ultralight 11
-# UID, ATQA and SAK are common for all formats
-UID: 04 A6 0A F2 DD 75 84
-ATQA: 44 00
-SAK: 00
-# Mifare Ultralight specific data
-Data format version: 1
-Signature: 68 D1 8E 8A 85 F1 B7 FC 1C 07 9C 9F 8B 9F 4E 6B B7 7C 23 48 E0 69 6C 89 35 53 0F BC D8 00 27 3B
-Mifare version: 00 04 03 01 01 00 0B 03
-Counter 0: 0
-Tearing 0: BD
-Counter 1: 0
-Tearing 1: BD
-Counter 2: 0
-Tearing 2: BD
-Pages total: 20
-Pages read: 20
-Page 0: 04 A6 0A 20
-Page 1: F2 DD 75 84
-Page 2: DE 48 F0 00
-Page 3: 00 00 00 00
-Page 4: 05 8D C3 F6
-Page 5: 0B AB 31 60
-Page 6: 13 27 83 B5
-Page 7: 4E F9 44 B7
-Page 8: 00 00 00 00
-Page 9: 00 00 00 00
-Page 10: 00 00 00 00
-Page 11: 00 00 00 00
-Page 12: 00 00 00 00
-Page 13: 00 00 00 00
-Page 14: 00 00 00 00
-Page 15: 00 00 00 00
-Page 16: 00 00 00 FF
-Page 17: 00 05 00 00
-Page 18: 00 00 00 00
-Page 19: 00 00 00 00
-Failed authentication attempts: 0
From 98d9e82705cd3f96dc1ab8051b326865f8f06aab Mon Sep 17 00:00:00 2001
From: UberGuidoZ <57457139+UberGuidoZ@users.noreply.github.com>
Date: Wed, 21 Dec 2022 15:13:04 -0800
Subject: [PATCH 4/4] Update ReadMe.md
---
Wifi_DevBoard/ReadMe.md | 6 ++----
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/Wifi_DevBoard/ReadMe.md b/Wifi_DevBoard/ReadMe.md
index 0b16f483..93d5a7cc 100644
--- a/Wifi_DevBoard/ReadMe.md
+++ b/Wifi_DevBoard/ReadMe.md
@@ -30,11 +30,9 @@ Sequoia has been kind enough to create a [web flasher](https://sequoiasan.github
Another deauther option can be found at [HEX0DAYS repo over here](https://github.com/HEX0DAYS/FlipperZero-PWNDTOOLS)! (Full instructions included.)
-# [Marauder](https://github.com/justcallmekoko/ESP32Marauder) install information
+# [Marauder](https://github.com/justcallmekoko/ESP32Marauder) install information (easy flash for Windows: [HERE](https://github.com/UberGuidoZ/Flipper/tree/main/Wifi_DevBoard/FZ_Marauder_Flasher))
-## New easy flash tool for Windows now available! [CLICK HERE](https://github.com/UberGuidoZ/Flipper/tree/main/Wifi_DevBoard/FZ_Marauder_Flasher)
-
-Direct from the dev WillStunForFood on Discord - check out [his video walkthrough](https://www.youtube.com/watch?v=_YLTpNo5xa0) too!:
+Direct from the dev WillStunForFood (aka JustCallMeKoko) on Discord - check out [his video walkthrough](https://www.youtube.com/watch?v=_YLTpNo5xa0) too!:
- Plug the WiFi dev board directly into your PC
- Upload the MarauderOTA firmware from source via Arduino IDE