![]() ![]() Since this weapon slows you, use a grappling weapon, Rocket Jump or use a Jetpack to escape.Hit the enemies with this weapon first, then quickly finish them off with a powerful shotgun. This weapon slows the enemies heavily.When reloading, 3 cat heads hop into the hole in the forearm, and appears back in the capsule. When shot, the Bomber Cat shoots a pink projectile(presumed to be hairballs, as the cats are alive) which explodes into a pink explosion upon impact, dealing moderate damage and heavily slowing the enemies caught in the radius. It seems like a cybernetic module, and it is mostly pink and white. But unlike the Proton Freezer, the gun wraps around your arm like the Goo Substance Scythe. It seems to look like a cat version of the Proton Freezer. It is mostly colored white and pink, and the number '03' is written on the arm. The barrel which replaces your hand, resembles a mix between the Smart Bullet Bazooka and a cat. The magazine is located at your shoulder, which is a capsule with 3 cats(black, orange and grey) in it. WiFi: ESP32 co-processor with the WiFiNINA firmware allows WiFi connections to use with HTTP or MQTT protocols, which allows relay and spoofing attacks to be tested over long distances or on local web servers, check out the examples.The Bomber Cat replaces your right arm. Magspoof mode can emulate magnetic stripes cards by emulating the electromagnetic pulses of this type of card. Magspoof: for magnetic stripes interaction. In this mode, BomberCat generates an RF field, while a tag or card only modulates it. It can read or write to a tag (although reading is a more common use case because tags will often be write-protected). In this mode, BomberCat communicates with a passive tag, an NFC smart card, or an NFC device operating in the card emulation mode. Read/Write: in which BomberCat behaves as an NFC reader/writer. However, card emulation mode is not only beneficial for smartphones but any type of portable device. It does not initiate communication, it only responds to the NFC reader.Ī typical application of the card emulation mode is how people use NFC on their smartphones to replace several cards, badges, or tags at once (using the same smartphone for RFID access controls, contactless payments, etc). In this mode, BomberCat emulates an NFC tag. We have prepared a series of examples with which you can start experimenting, check out the examples folder.Ĭard emulation mode: in which BomberCat behaves as a smart card or a tag. ![]() Easy to program using frameworks such as Arduino, Ciruitpython, and Micropython. The USB interface provided by the RP2040 MCU and the NFC functionality is guaranteed by the PN7150.īomberCat is designed to be intuitive for users. ApplicationsīomberCat features an RP2040 MCU working along with the PN7150 (a recent generation NFC chip). It also has an ESP32 co-processor with WiFiNINA firmware that allows it to make WiFi connections to use with HTTP or MQTT protocols, which will allow relay and spoofing attacks to be tested over long distances or on local web servers. Specially created to audit banking terminals, and identify NFC readers and sniffing tools, with this tool you can audit, read or emulate magnetic stripes and NFC cards. Black edition only How does BomberCat work?īomberCat is the latest security tool that combines the most common card technologies: NFC technology (Near Field Communication) and magnetic stripe technology used in access control, identification, and banking cards.
0 Comments
Leave a Reply. |