J-Run / mf_nonce_bruteLinks
1st phase of mifare classic nested auth key recovery
☆23Updated 7 years ago
Alternatives and similar repositories for mf_nonce_brute
Users that are interested in mf_nonce_brute are comparing it to the libraries listed below
Sorting:
- 2nd phase of mifare classic nested auth key recovery☆13Updated 11 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆77Updated 8 years ago
- ☆124Updated 9 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Updated 9 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- NFC Ultralight Toolkit☆77Updated 11 years ago
- ☆106Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆53Updated 11 years ago
- Magnetic stripe spoofer implementing audio waves.☆40Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- ☆84Updated 7 years ago
- ☆45Updated 2 weeks ago
- Car Backdoor Maker☆220Updated 7 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Updated 8 years ago
- Work in progress toolkit for KRACK attack.☆70Updated 6 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Updated last year
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆143Updated 7 years ago
- Simple daemon to create a wifi hotspot on Linux☆14Updated 5 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Updated 9 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Updated 7 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago