J-Run / mf_nonce_bruteLinks
1st phase of mifare classic nested auth key recovery
☆23Updated 7 years ago
Alternatives and similar repositories for mf_nonce_brute
Users that are interested in mf_nonce_brute are comparing it to the libraries listed below
Sorting:
- 2nd phase of mifare classic nested auth key recovery☆13Updated 10 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 7 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Updated 8 years ago
- 1st phase of mifare classic nested auth key recovery☆15Updated 5 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- ☆20Updated 9 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆87Updated 7 years ago
- ☆15Updated 8 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆74Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Pre-OS microcode updater☆43Updated 6 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago