InteliSecureLabs / iClassReader
Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified
☆28Updated 10 years ago
Alternatives and similar repositories for iClassReader:
Users that are interested in iClassReader are comparing it to the libraries listed below
- Tools to pull data from HID iClass readers☆16Updated 12 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆85Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- This is pulled from http://www.openpcd.org/Talk:HID_iClass_demystified☆20Updated 12 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆32Updated 2 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- ☆10Updated 7 years ago
- Hacker Warehouse electronic badge that was made for DEF CON 25☆17Updated 7 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Global key for HID iCLASS☆41Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- ☆15Updated 8 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce☆9Updated 7 years ago
- iClass / Picopass tool for libnfc☆53Updated 3 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆24Updated last year
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- The BUSSide Badge☆46Updated 2 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆22Updated 7 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆20Updated 9 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆115Updated 6 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆33Updated 7 years ago
- ☆17Updated 7 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 2 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago