Slides from my Area41 security conference talk in Zurich/CH
☆18Aug 3, 2019Updated 6 years ago
Alternatives and similar repositories for MacGyver-s-return---An-EMV-Chip-cloning-case
Users that are interested in MacGyver-s-return---An-EMV-Chip-cloning-case are comparing it to the libraries listed below
Sorting:
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- HackRF software and captures by everyone and for everyone. Argh matey.☆15Oct 7, 2022Updated 3 years ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- different emv-tools ready for compilation☆24Feb 8, 2017Updated 9 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- ☆37Sep 30, 2021Updated 4 years ago
- hidden ios keystroke logger☆13Feb 6, 2021Updated 5 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- EMV tooling - Provide read and write access to payment cards☆45Aug 29, 2023Updated 2 years ago
- Hardware Design for the Super Magfest 2024 Swadge☆13May 4, 2024Updated last year
- Expanded version of the Espressif ESP webcam☆15Oct 7, 2020Updated 5 years ago
- Kernel driver for the Ralink rt5572 dual-band Wi-Fi adapter, configured for use with Boundary Devices boards☆14Jun 26, 2014Updated 11 years ago
- Scutex is a .Net licensing system built on top of WPF and WCF and .Net 4☆16Aug 8, 2012Updated 13 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- ☆11May 30, 2018Updated 7 years ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆10Apr 10, 2021Updated 4 years ago
- A proof of concept of a PHP Miner that can mine DuinoCoin☆10Apr 4, 2022Updated 3 years ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 4 years ago
- WiFi Pineapple Community Packages☆13Nov 6, 2022Updated 3 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A cryptography agnostic rolling code implementation for remote-controlled embedded application☆13Sep 11, 2020Updated 5 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Front End for ESPEasy >>>>>>>NOT YET READY FOR PRODUCTION<<<<<<<<☆11Dec 15, 2020Updated 5 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Flipper Application Catalog☆17Feb 16, 2026Updated 3 weeks ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Cordova地图插件(在原插件基础上纠正了国内定位精度不高的问题)☆11Aug 28, 2021Updated 4 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- self contained mfkey tool for all 3 mfkeys☆18Sep 20, 2024Updated last year
- An Identity Verification App to be used to for KYC purposes☆15Apr 23, 2018Updated 7 years ago
- ☆12Sep 27, 2018Updated 7 years ago