ColdHeat / iclass
Tool to read and write iclass cards without the master key
☆105Updated 5 years ago
Alternatives and similar repositories for iclass:
Users that are interested in iclass are comparing it to the libraries listed below
- Global key for HID iCLASS☆41Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆85Updated 7 years ago
- EM4100 RFID Cloner Kit☆64Updated last year
- This is pulled from http://www.openpcd.org/Talk:HID_iClass_demystified☆20Updated 12 years ago
- Wiegotcha: Long Range RFID Thief☆229Updated 3 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- iClass / Picopass tool for libnfc☆53Updated 3 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆62Updated 8 years ago
- Tools to pull data from HID iClass readers☆16Updated 12 years ago
- ☆162Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆115Updated 6 years ago
- Utilities to help with reverse engineering RF protocols.☆90Updated 4 years ago
- Transceiver for Hella wireless car key fobs.☆176Updated 2 years ago
- Helper scripts for RfCat devices☆209Updated 7 years ago
- 📡 On-off keying tools for your SD-arrrR☆143Updated last year
- ☆39Updated 3 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆84Updated 10 years ago
- Def Con 2017 Car Hacking Village Badge☆44Updated 4 years ago
- Database of private SSL/SSH keys for embedded devices☆255Updated 11 months ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆157Updated 6 years ago
- rolljam☆87Updated 8 years ago
- ☆71Updated 8 years ago
- ☆76Updated 9 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- ☆118Updated 8 years ago
- A wearable Sub-GHz RF hacking tool☆120Updated 5 years ago
- This repository is deprecated. Go to:☆117Updated 5 years ago
- ☆106Updated 8 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago