Metadata-Version: 2.1
Name: FlipperNested
Version: 2.0.2
Summary: Recover keys from collected nonces
Home-page: https://github.com/AloneLiberty/FlipperNestedRecovery
Author: AloneLiberty
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Operating System :: MacOS
Classifier: Operating System :: POSIX :: Linux
Classifier: Operating System :: Microsoft :: Windows
Requires-Python: >=3.8
Description-Content-Type: text/markdown
License-File: LICENSE.md
Requires-Dist: protobuf (>4)
Requires-Dist: pyserial

# Flipper Nested Recovery script

Script recovers keys from collected authorization attempts (nonces).
You can collect nonces on Flipper Zero with [FlipperNested](https://github.com/AloneLiberty/FlipperNested)

#### Flipper Zero should be connected with USB cable and not used by ANY other software (./fbt log, qFlipper, lab.flipper.net)

## Installation

```bash
pip install --upgrade FlipperNested
```

or, install from sources:
```bash
pip install --upgrade pyserial protobuf wheel setuptools
python setup.py sdist bdist_wheel
pip install --user --upgrade --find-links=./dist FlipperNested
```

## Usage

```bash
$ FlipperNested
Checking 12345678.nonces
Recovering key type A, sector 0
Found 1 key(s): ['ffffffffffff']
...
Found potential 32 keys, use "Check found keys" in app
```

```bash
$ FlipperNested --help
usage: FlipperNested [-h] [--uid UID] [--progress] [--save] [--preserve] [--file FILE]

Recover keys after Nested attack

options:
  -h, --help   show this help message and exit
  --uid UID    Recover only for this UID
  --progress   Show key recovery progress bar
  --save       Debug: Save nonces/keys from Flipper
  --preserve   Debug: Don't remove nonces after recovery
  --file FILE  Debug: Recover keys from local .nonces file
```
