J-Run / mf_nonce_bruteLinks
1st phase of mifare classic nested auth key recovery
☆23Updated 7 years ago
Alternatives and similar repositories for mf_nonce_brute
Users that are interested in mf_nonce_brute are comparing it to the libraries listed below
Sorting:
- 2nd phase of mifare classic nested auth key recovery☆13Updated 11 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆77Updated 8 years ago
- ☆124Updated 9 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆97Updated 11 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- CVE-2017-0785 BlueBorne PoC☆38Updated 8 years ago
- NFC Ultralight Toolkit☆78Updated 11 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Updated 9 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- Magnetic stripe spoofer implementing audio waves.☆40Updated 9 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- Pre-OS microcode updater☆43Updated 7 years ago
- ☆106Updated 10 years ago
- ☆45Updated last month
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Updated 9 years ago
- GUI Framework on top of Killerbee☆84Updated 8 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆143Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Updated 9 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- Sensor software☆68Updated 4 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Updated 7 years ago
- ☆38Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago