MiFare Classic 1k Smart Card MFOC Nested Attack
☆15Feb 8, 2018Updated 8 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A plugin for Burp Suite Pro to work with attacker payloads and automatically generate check digits for credit card numbers and similar nu…☆11Jun 3, 2015Updated 10 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- Some Python Hacking with my MagTek Card Reader☆28Dec 21, 2011Updated 14 years ago
- This arduino sketch uses the Digispark Attiny85 DigiKeyboard library to carry out a HID attack on a Windows 10 machine. The attack consis…☆18Jan 8, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ECE 209 Security of Embedded Systems Project☆17Mar 17, 2018Updated 8 years ago
- Host Card Emulation. Based on Cyanogenmod 9 Android. Design goal is relay DesFire card communication (Widely used in transportation syste…☆29Mar 8, 2014Updated 12 years ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 6 months ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- Developed a software for ATM machine which performs all the banking transactions like cash deposits, withdrawals, fund transfers and also…☆17Jan 29, 2016Updated 10 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆21Feb 23, 2021Updated 5 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- Build your own WiFi jammer with an ESP8266.☆23Mar 8, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆34Apr 2, 2026Updated last week
- A 3D printed, case for the Sofle v2.0w keyboard☆15Jul 22, 2023Updated 2 years ago
- Flipper Zero rfid and ibutton fuzzer lists☆34Jul 26, 2023Updated 2 years ago
- Collection of KDF plugins for the Flipper Zero☆18Jun 12, 2024Updated last year
- WiFi password bruteforce on Mac OS☆15Jan 9, 2016Updated 10 years ago
- A collection of tools to read/write NFC ST SRI512 and SRIX4K tags.☆16Feb 6, 2021Updated 5 years ago
- A simple CUDA accelerated bruteforcer for KeeLoq algorithm☆49Oct 6, 2023Updated 2 years ago
- List of crackpot 'scientists' and 'thinkers'☆20Jun 22, 2025Updated 9 months ago
- This website will be holding list / details of each and every tool available via Android Tamer☆28Jul 27, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Airprobe for frequency hopping GSM channels☆71Apr 24, 2017Updated 8 years ago
- An awesome and comprehensive list of LLM Securtiy Startups.☆15Nov 9, 2024Updated last year
- A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer e…☆29May 16, 2017Updated 8 years ago
- A specification pattern for consistent AI code generation.☆59Feb 16, 2026Updated last month
- Adds a Spy option to the React Native development menu☆14Jan 2, 2019Updated 7 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Community contributions to the OpenFHE project☆14Mar 8, 2025Updated last year
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- GSM Sniffer☆39Oct 16, 2011Updated 14 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NFC Ultralight Toolkit☆80Oct 16, 2014Updated 11 years ago
- Useful to get input on noecho, secrets, passwords, token, hints☆12Jun 17, 2018Updated 7 years ago
- get windows password ntlm☆11Dec 5, 2019Updated 6 years ago
- Designed an algorithm to detect a license plate from a car and then used OCR to rcognize the Plate☆13Feb 19, 2014Updated 12 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆20Nov 18, 2019Updated 6 years ago
- 🔐 Get Wi-Fi password from Keychain☆15Jan 21, 2021Updated 5 years ago
- First it steals.. Then it jettisons.☆69Nov 20, 2012Updated 13 years ago