Current command:
lf t55xx
----------- ---------------------------- notice ----------------------------- Remember to run `lf t55xx detect` first whenever a new card is placed on the Proxmark3 or the config block changed. help This help ----------- --------------------- operations --------------------- clonehelp Shows the available clone commands config Set/Get T55XX configuration (modulation, inverted, offset, rate) dangerraw Sends raw bitstream. Dangerous, do not use!! detect Try detecting the tag modulation from reading the configuration block deviceconfig Set/Get T55XX device configuration dump Dump T55xx card Page 0 block 0-7 info Show T55x7 configuration data (page 0/ blk 0) p1detect Try detecting if this is a t55xx tag by reading page 1 read Read T55xx block data resetread Send Reset Cmd then lf read the stream to attempt to identify the start of it restore Restore T55xx card Page 0 / Page 1 blocks trace Show T55x7 traceability data (page 1/ blk 0-1) wakeup Send AOR wakeup command write Write T55xx block data ----------- --------------------- recovery --------------------- bruteforce Simple bruteforce attack to find password chk Check passwords from dictionary/flash protect Password protect tag recoverpw Try to recover from bad password write from a cloner sniff Attempt to recover T55xx commands from sample buffer special Show block changes with 64 different offsets wipe Wipe a T55xx tag and set defaults (will destroy any data on tag)