Slides from my Area41 security conference talk in Zurich/CH
☆18Aug 3, 2019Updated 6 years ago
Alternatives and similar repositories for MacGyver-s-return---An-EMV-Chip-cloning-case
Users that are interested in MacGyver-s-return---An-EMV-Chip-cloning-case are comparing it to the libraries listed below
Sorting:
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- HackRF software and captures by everyone and for everyone. Argh matey.☆15Oct 7, 2022Updated 3 years ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- different emv-tools ready for compilation☆24Feb 8, 2017Updated 9 years ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Browse the contents of EMV smart cards using PCSC compliant hardware☆74Sep 25, 2011Updated 14 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Interactive EMV chip card explorer☆35Feb 22, 2026Updated 2 weeks ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- ☆37Sep 30, 2021Updated 4 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- EMV libraries and tools☆45Mar 1, 2026Updated last week
- EMV tooling - Provide read and write access to payment cards☆45Aug 29, 2023Updated 2 years ago
- Expanded version of the Espressif ESP webcam☆15Oct 7, 2020Updated 5 years ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- Hardware Design for the Super Magfest 2024 Swadge☆13May 4, 2024Updated last year
- Scutex is a .Net licensing system built on top of WPF and WCF and .Net 4☆16Aug 8, 2012Updated 13 years ago
- A proof of concept of a PHP Miner that can mine DuinoCoin☆10Apr 4, 2022Updated 3 years ago
- An ESPHome component for accepting a secret PIN over Bluetooth LE.☆11Apr 7, 2024Updated last year
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆10Apr 10, 2021Updated 4 years ago
- ☆11May 30, 2018Updated 7 years ago
- Kernel driver for the Ralink rt5572 dual-band Wi-Fi adapter, configured for use with Boundary Devices boards☆14Jun 26, 2014Updated 11 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- An electron desktop app to read EMV card data☆12Oct 22, 2019Updated 6 years ago
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- orgleaks is a tool to run gitleaks for an organization.☆11Oct 19, 2021Updated 4 years ago
- An Identity Verification App to be used to for KYC purposes☆15Apr 23, 2018Updated 7 years ago
- Large-scale Machine Learning using Apache Spark☆15May 6, 2019Updated 6 years ago
- Mobile monitoring and management app for Fly.io.☆13Nov 16, 2025Updated 3 months ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago