diff --git a/RFID/H10301 Bruteforce/ReadMe.md b/RFID/H10301 Bruteforce/ReadMe.md index b3070043..ddf23f37 100644 --- a/RFID/H10301 Bruteforce/ReadMe.md +++ b/RFID/H10301 Bruteforce/ReadMe.md @@ -1,8 +1,10 @@ # H10301 Bruteforce (Thanks [gh0st91](https://github.com/gh0st91/fz)!) Used with the RFID Fuzzer, you can load these UIDs to try _every_ possible one.
-It's large and will take awhile to go through. (More for fun and testing than actual use.) +It's large and will take around 2 hours to finish. (More for fun and testing than actual use.) Simply extract the ZIP then copy the `H10301_BF.txt` file into the `rfidfuzzer` folder on your SD card. +![H10301_BF](https://user-images.githubusercontent.com/57457139/200435371-2c66a140-5d9b-45fc-8bd7-92e385fa84a2.gif) + Github linked above includes the Python script used to create the TXT file.