Added
- MIFARE Ultralight C feature parity with MIFARE Classic in native NFC app
- Dictionary attack: Uses system and user dictionaries stored under /nfc/assets/ to unlock Ultralight C tags
- Key management: Extra Actions → MIFARE Ultralight C Keys in the NFC app allows you to add, list, and remove Ultralight C keys from your Flipper
- UI: Dictionary attack scene and menu options
- Updated MFKey to 3.1: Key recovery is 20% faster, new write buffering of Static Encrypted Nested key candidates performs recovery 70x faster
- Bumped Picopass to 1.19: CHANGELOG
Fixed
- Various issues with ByteInput, KeysDict, and key input length overflow
OFW changes: See the release notes for 1.3.4
Under development
- More efficient static encrypted bruteforce attacks (splitting CUID dictionary by key index)
- Support new MIFARE Classic backdoor keys, including
73B9836CF168
- Add
card_detected
support in Ultralight C dictionary attack ("Lost the tag!") - Ultralight C key recovery attacks: Fixing two usability issues identified in beta testing (unreleased applications)
- Tesla credential enrollment: use your Flipper as an unofficial Tesla key card
Join our Discord and help shape our cutting-edge and NFC-focused firmware.