Local fork of Henryk Ploetz' smardcard shell
Go to file
hploetz 9c614ae526 TLV_utils.decode as external tool
git-svn-id: svn+ssh://localhost/home/henryk/svn/cyberflex-shell/trunk@84 f711b948-2313-0410-aaa9-d29f33439f0b
2006-06-14 09:11:46 +00:00
cards Some GSM specific code 2006-05-26 04:51:31 +00:00
README a readme 2006-05-19 00:30:59 +00:00
TLV_utils.py ls -l (still ugly) 2006-05-24 07:58:55 +00:00
brutefid.py brutefid now can bruteforce fids below a DF and also gives nicer progress output with ETA 2006-05-22 03:04:01 +00:00
crypto_utils.py basic functions working 2005-09-29 03:39:27 +00:00
cyberflex-shell.e3p ls -l (still ugly) 2006-05-24 07:58:55 +00:00
cyberflex-shell.py forgot 'nother one 2006-05-26 04:37:29 +00:00
shell.py sorting 2006-05-25 13:36:25 +00:00
tlvdecoder.py TLV_utils.decode as external tool 2006-06-14 09:11:46 +00:00
utils.py generalize file operations, specialise for starcos 2006-05-21 13:04:48 +00:00

README

This is a simple smartcard shell that has evolved from a more convenient way
to enter APDUs (compare: pcsc-tool scriptor) through a tool to open a secure
channel to a cyberflex card (hence the name) to a more generic tool to act
on smart-cards.

It is written in Python (you might need 2.4 or up) and needs pycsc to
communicate with the smart card terminal (with PC/SC, e.g. pcsc-lite).
You can get pycsc from http://homepage.mac.com/jlgiraud/pycsc/Pycsc.html