☆13Sep 12, 2020Updated 5 years ago
Alternatives and similar repositories for RelayDESFireEV1
Users that are interested in RelayDESFireEV1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for performing relay attacks on RFID/NFC systems (ISO 14443-4A)☆29Nov 24, 2022Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Corso di Enterprise Applications - CdS in informatica - Università della Calabria☆13Apr 24, 2026Updated last week
- Instructions for turning off the keyless opening feature of your car so it can't be stolen using a relay attack☆20Aug 23, 2025Updated 8 months ago
- Tools for easy deployment of osmocom stack and pentesting gsm networks with CalypsoBTS☆16Aug 1, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Nov 5, 2013Updated 12 years ago
- Relay Attack on Vehicle Passive Keyless Entry System☆40Mar 21, 2018Updated 8 years ago
- This repository implements an MME for the LTE stack. It implements: IMSI catcher, Downgrade attack and denial of service. This repository…☆15May 11, 2022Updated 3 years ago
- Instrument Cluster Simulator☆15Jun 12, 2020Updated 5 years ago
- Boscloner - All in One RFID Cloning Toolkit☆17Apr 14, 2017Updated 9 years ago
- Man-in-the-middle device for attacking RFID access control systems☆17Feb 7, 2023Updated 3 years ago
- Write to a Waveshare e-Paper Tag over NFC with a Flipper Zero☆26Sep 21, 2023Updated 2 years ago
- ☆18Jan 24, 2022Updated 4 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A library for reading, writing and analysis of magnetic stripe information.☆15Apr 12, 2020Updated 6 years ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- my own MySensors devices☆23Feb 13, 2016Updated 10 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Magspoof implementation via ESP8266 (ledunia)☆21Jul 27, 2018Updated 7 years ago
- app with bus-pirate like functionality for the Flipper Zero☆22Oct 23, 2023Updated 2 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 3 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 3 months ago
- Snips platform running in docker☆19May 8, 2019Updated 6 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- A tool allows you use your phone emulating NFC cards☆24Mar 23, 2017Updated 9 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Updated this week
- ☆20Oct 25, 2024Updated last year
- guide to master the flipepr for beginners☆21Sep 17, 2022Updated 3 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆18Aug 14, 2024Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- ☆28Oct 30, 2020Updated 5 years ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago
- GUI CalypsoBTS☆39Mar 11, 2023Updated 3 years ago
- ProxyWatch☆48Apr 25, 2026Updated last week
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago