Simple Android app to explore NFC tags
☆16Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for nfc-explorer
Users that are interested in nfc-explorer are comparing it to the libraries listed below
Sorting:
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- A simple C# password manager that uses SHA256 and AES Encryption.☆10Nov 20, 2020Updated 5 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 2 years ago
- SimInformation is a cross-platform Xamarin/UWP library that provides a way to access information on your SIM card.☆12Sep 7, 2020Updated 5 years ago
- ☆14Updated this week
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- Small library for validating Australian Business Numbers☆16Jun 18, 2025Updated 8 months ago
- Windows utility for managing Android APK files.☆11May 10, 2020Updated 5 years ago
- A SMS Door Bell using CC3200 LaunchPad and the Telstra SMS APIs (Australian Telco)☆12Jul 3, 2015Updated 10 years ago
- Java Card applet with REFRESH command support for SIM Toolkit application☆17Aug 2, 2020Updated 5 years ago
- 收集各种有趣的github项目☆24Feb 25, 2026Updated last week
- 这是提供给.Net使用的window hook和api hook托管和非托管混合项目☆12May 13, 2016Updated 9 years ago
- Protecting Windows-Server against RDP (Remote-Desktop) attacks (Ban after X attempts, with report function for AbuseIPDB.com)☆14Oct 19, 2018Updated 7 years ago
- A simple engine to parse IL code to an abstract syntax tree using dnlib☆10May 1, 2014Updated 11 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Jun 6, 2022Updated 3 years ago
- A C# transparent file encryption example which was implemented with the Transparent Encryption File System Filter Driver SDK. The Transp…☆14Jan 25, 2026Updated last month
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 3 years ago
- Telemedicne Smart Doctor Diagonose a patient by Machine Learning services by AWS. It take Data from differnt madical organization and Sto…☆14Aug 19, 2022Updated 3 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- 本项目集成了全网优秀的攻防工具项目,包含自动化利用,子域名、敏感目录、端口等扫描,各大中间件,cms漏洞利用工具以及应急响应等资料。☆13Jul 18, 2022Updated 3 years ago
- Discover similar functions structures in binaries using graph theory.☆21Oct 14, 2021Updated 4 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- This repo contains deobfuscated files of the Redline malware code which was behind the The recent Github Account hacks and stealing sensi…☆15Sep 18, 2024Updated last year
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- 先知社区爬虫☆14Dec 7, 2020Updated 5 years ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆19Dec 23, 2025Updated 2 months ago
- Shellcode Loader / bypass *60、*rong☆16Dec 1, 2023Updated 2 years ago
- A command line tool to compare apks (Android packages)☆12Oct 10, 2024Updated last year
- ☆16Sep 23, 2021Updated 4 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Userspace helper for uvesafb.☆24May 29, 2014Updated 11 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Small malware made by me for educational & entertainment purposes. It modifies some registry keys, make copies of it self, overwrites the…☆15Jan 10, 2024Updated 2 years ago
- Simple and sane compression wrapper library.☆19Oct 28, 2022Updated 3 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 6 months ago
- Obfuscation method using virtual machines.☆27Mar 2, 2020Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆21Updated this week
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago