jeeberhardt / crypto1Links
CRYPTO1 Mifare classic
☆30Updated 9 years ago
Alternatives and similar repositories for crypto1
Users that are interested in crypto1 are comparing it to the libraries listed below
Sorting:
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- ☆16Updated 6 years ago
- ☆13Updated 8 years ago
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- ☆20Updated 3 months ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- Proxmark3 rvd4.0 adaptation based iceman fork☆14Updated 6 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Updated 8 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Updated 11 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆44Updated 9 years ago
- Integrating some Major Malfunction tools for Mag-stripe info☆55Updated 7 years ago
- A super micro fun implant☆23Updated 6 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- 1st phase of mifare classic nested auth key recovery☆15Updated 5 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆20Updated 9 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Raspberry Pi projects☆17Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 6 years ago
- Tor relay certificate downloader☆11Updated 8 years ago
- Near Field Communication (NFC) library for Arduino☆16Updated 5 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- 1st phase of mifare classic nested auth key recovery☆23Updated 7 years ago