ioerror / libmsr
Reading, writing and analysis of magnetic stripe information
☆25Updated 14 years ago
Alternatives and similar repositories for libmsr:
Users that are interested in libmsr are comparing it to the libraries listed below
- advanced code generator for John the Ripper☆12Updated 6 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A feedhunter's visualisation tool.☆16Updated 10 years ago
- ☆80Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- ☆14Updated 10 years ago
- SAVIORBURST☆21Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- ☆15Updated 8 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- See here:☆42Updated 12 years ago
- ☆12Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- Tools to pull data from HID iClass readers☆16Updated 12 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 5 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆17Updated 11 years ago
- ☆57Updated 11 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆21Updated 9 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Host files with DNS☆32Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- ☆10Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago