A tool that bypasses PN553 signature protection
☆50Aug 16, 2023Updated 2 years ago
Alternatives and similar repositories for PN553-Signature-Bypass
Users that are interested in PN553-Signature-Bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android App that genereates passcode authentication codes for Postfinance cards☆12Feb 22, 2022Updated 4 years ago
- SiLabs C8051F34x code protection bypass☆71Aug 19, 2021Updated 4 years ago
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆186Jul 13, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Oct 27, 2022Updated 3 years ago
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- Collection of RH850 Glitches☆63Apr 28, 2026Updated last week
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆34Jan 20, 2026Updated 3 months ago
- Binary Ninja loader for 64 bits Apple SEPROMs☆60Sep 7, 2025Updated 8 months ago
- Hexagon decompiler for Ghidra☆54Feb 15, 2022Updated 4 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 10 months ago
- Small binja plugin to import header file to types☆17Nov 11, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- ☆15Mar 21, 2022Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- The serial protocol analysis from the K3 laser☆22Apr 10, 2023Updated 3 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆69Jun 23, 2022Updated 3 years ago
- Private headers & entitlements for daemons, frameworks, applications private frameworks and more for iOS 17.0 21A328☆25Oct 25, 2023Updated 2 years ago
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆99Sep 30, 2021Updated 4 years ago
- ☆18Nov 19, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Nov 9, 2022Updated 3 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- FPGA-based glitcher for the Digilent Arty FPGA development board.☆34Aug 18, 2017Updated 8 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Jul 23, 2020Updated 5 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- Raw binary firmware analysis software☆577Jun 6, 2024Updated last year
- CVE-2022-46718: an app may be able to read sensitive location information.☆27May 1, 2023Updated 3 years ago
- The firmware, gateware, and host software of the ESP CPA Board.☆30Apr 30, 2024Updated 2 years ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆17Dec 18, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆29Aug 2, 2021Updated 4 years ago
- Open source software and hardware transmission system for traditional and rotating MR☆12Jun 28, 2019Updated 6 years ago
- A low-entropy shellcode executor that encodes shellcode bytes into common English words, with anti-debugging capabilities.☆22Aug 10, 2025Updated 8 months ago
- ☆31Aug 26, 2021Updated 4 years ago
- ☆13Jan 10, 2023Updated 3 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- Detect jamming on ISM bands using an RTLSDR dongle and a Raspberry Pi or laptop PC☆36Jul 15, 2017Updated 8 years ago