A Tamarin model and analysis of EMV contactless
☆15Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for EMVerify-PAN-routing
Users that are interested in EMVerify-PAN-routing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Project website☆15Jan 2, 2023Updated 3 years ago
- A Tamarin model and analysis of EMV☆36Feb 8, 2021Updated 5 years ago
- A 2-4h workshop on the Tamarin protocol verifier.☆22Mar 9, 2026Updated 3 weeks ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- Card emulator and test kit for Trip Reader☆16Sep 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Self-hosted web application to monitor the obsolescence of your FOSS applications in production. UptoDateOrNot ???☆15Feb 24, 2025Updated last year
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- ☆21Oct 30, 2024Updated last year
- This is the code for the Pluto framework to assess data exposure by an Android app to an advertising library. The framework was presented…☆13Jan 23, 2018Updated 8 years ago
- Unified Maude model-checking tool☆13Feb 4, 2026Updated last month
- Sources of the EuroProofNet web site.☆13Mar 19, 2026Updated last week
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆21Aug 6, 2015Updated 10 years ago
- Repository for community related content for swiyu - the Swiss e-ID trust infrastructure☆41Mar 10, 2026Updated 2 weeks ago
- tandem repeat finding from erroneous long reads☆15Aug 4, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- ☆17Aug 29, 2022Updated 3 years ago
- Double Entry Accounting for Rails☆18Jan 10, 2018Updated 8 years ago
- Simple shell scripts for DNS and DNSSEC monitoring☆18Apr 25, 2022Updated 3 years ago
- ☆23May 19, 2022Updated 3 years ago
- MSIEVE: A Library for Factoring Large Integers☆15Apr 7, 2023Updated 2 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- Tamarin models for state continuity of SGX enclave programs☆14Aug 6, 2021Updated 4 years ago
- Chrome App that talks to Android host-based card emulation application.☆11Nov 21, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Adjust showing frequency of Android app messages, and to be more user friendly 🐦☆17Jul 25, 2017Updated 8 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- Android HCE (host-based Card Emulation) app sample of how to "emulate" an NFC/RFID tag/card☆21Sep 19, 2022Updated 3 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- TLA+ modules to model message-passing with different guarantees (reliable, duplicating, out-of-order, at-least-once), and create visualiz…☆10Apr 20, 2021Updated 4 years ago
- A tool for the automatic generation of Isabelle/HOL correctness proofs for security protocols.☆18Jun 21, 2015Updated 10 years ago
- SmartTokens are small-sized tangible tokens that can sense multiple types of motion, multiple types of touch/grip, and send input events …☆12Dec 11, 2015Updated 10 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆33Jan 20, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆10Feb 1, 2019Updated 7 years ago
- Distributed QC for Qiskit☆14Jan 18, 2024Updated 2 years ago
- C++ Implementations of Suffix Array Constructions Algorithms for SA-IS and Skew as well as Kasai's algorithm for LCP construction.☆16May 31, 2021Updated 4 years ago
- Smartcard APDU interception and MITM for one smartcard model☆38Mar 2, 2018Updated 8 years ago
- The HW-CBMC and EBMC Model Checkers for Verilog☆102Updated this week
- Cochlear implant signal processing☆10Jun 24, 2021Updated 4 years ago
- Specification and Analysis for Requirements Tool☆10Mar 31, 2016Updated 9 years ago