fboldewin / MacGyver-s-return---An-EMV-Chip-cloning-case
Slides from my Area41 security conference talk in Zurich/CH
☆14Updated 5 years ago
Alternatives and similar repositories for MacGyver-s-return---An-EMV-Chip-cloning-case:
Users that are interested in MacGyver-s-return---An-EMV-Chip-cloning-case are comparing it to the libraries listed below
- A non-exhaustive list of hacktools related to EMV fraud☆55Updated 3 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader☆16Updated 5 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆10Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Board layout☆12Updated 9 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- ECE 209 Security of Embedded Systems Project☆14Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Power Loader botnet☆38Updated 9 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- Apple wireless research and tools☆17Updated 4 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆28Updated 6 years ago
- Radio Code Calculator is an online service along with Web API & SDK for generating car radio unlock codes for popular vehicle brands.☆19Updated 5 months ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Updated 10 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆18Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated 6 months ago
- Hack for RUHacks☆21Updated 6 years ago
- NFC transaction copier implementing Visa MSD protocol☆43Updated 5 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Updated 8 years ago
- Broadpwn bug (CVE-2017-9417)☆50Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Dark Reader Chrome and Firefox extension☆12Updated 5 years ago
- Starter Kit: Hardware Hacking☆13Updated 4 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago