J-Run / mf_nonce_brute
1st phase of mifare classic nested auth key recovery
☆23Updated 7 years ago
Alternatives and similar repositories for mf_nonce_brute:
Users that are interested in mf_nonce_brute are comparing it to the libraries listed below
- 2nd phase of mifare classic nested auth key recovery☆13Updated 10 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- Magnetic stripe spoofer implementing audio waves.☆38Updated 8 years ago
- 1st phase of mifare classic nested auth key recovery☆15Updated 5 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 10 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Updated 8 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- NFC Ultralight Toolkit☆74Updated 10 years ago
- Simple daemon to create a wifi hotspot on Linux☆13Updated 4 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Magspoof R3 - Wireless magnetic stripe emulator☆66Updated 6 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆73Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆60Updated 6 years ago
- Public resources NB shares☆18Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- Proof of Concept of HID26 Bruteforce☆28Updated 2 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆48Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- MagSpoof for Raspberry PI GPIO☆61Updated 8 years ago