EMVrace / EMVerifyLinks
A Tamarin model and analysis of EMV
☆36Updated 4 years ago
Alternatives and similar repositories for EMVerify
Users that are interested in EMVerify are comparing it to the libraries listed below
Sorting:
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Smartcard APDU interception and MITM for one smartcard model☆38Updated 7 years ago
- Awesome list for baseband modem resources.☆13Updated 7 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆45Updated 6 years ago
- BlueRepli-Plus☆18Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- CSAW Embedded Security Challenge 2019☆37Updated 6 years ago
- ☆17Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Solutions to https://cryptopals.com problems☆28Updated 8 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Updated 2 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆90Updated 4 years ago
- OpenBTS-UMTS reloaded 2024. Compatibility with latest UHD drivers, several fixes and updated install documentation for Ubuntu 22.04☆60Updated last year
- Hardware design files for the PMOD based MUX☆13Updated 6 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆25Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Updated 7 years ago
- ☆96Updated 5 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 7 years ago
- Conferences, tools, papers, etc.☆46Updated 2 months ago
- Companion notebooks to the Hardware Hacking Handbook☆84Updated 4 years ago
- Slides and stuffs of the meetings during the 2020.☆16Updated 4 years ago
- Client side tools to play the CTS contest☆48Updated 4 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated last month
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆36Updated 3 years ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago