Various Proxmark3 Mods
☆58Sep 24, 2012Updated 13 years ago
Alternatives and similar repositories for rfid-proxmark3-mods
Users that are interested in rfid-proxmark3-mods are comparing it to the libraries listed below
Sorting:
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- ☆38Apr 24, 2019Updated 6 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- ☆24Apr 25, 2019Updated 6 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆188Apr 24, 2019Updated 6 years ago
- NetHunter Devices☆268Apr 25, 2019Updated 6 years ago
- NetHunter android application☆335Apr 25, 2019Updated 6 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆320Apr 25, 2019Updated 6 years ago
- MASSCAN Web UI☆504Oct 26, 2022Updated 3 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Proxmark3 client for Android☆27Jul 2, 2017Updated 8 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- ☆10Jul 28, 2017Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 9 years ago
- ECE 209 Security of Embedded Systems Project☆16Mar 17, 2018Updated 7 years ago
- Source code for the beta release of CobraDroid☆14Mar 8, 2020Updated 5 years ago
- A dirty, but easy, way to capture and replay 433mhz messages☆15Mar 28, 2017Updated 8 years ago
- rolljam☆89Jul 22, 2016Updated 9 years ago
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 8 years ago
- Hardware designs for fault detection☆19Apr 13, 2020Updated 5 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆63Sep 25, 2016Updated 9 years ago
- Experiments with the Yard Stick One, replay attacks☆19Feb 13, 2017Updated 9 years ago
- Kali Linux Recipes☆720May 1, 2019Updated 6 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Python simulation of "rolljam" attacks☆18Jul 29, 2022Updated 3 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆19Feb 26, 2021Updated 5 years ago
- A tutorial on performing a replay attack on a wireless doorbell using an RTL-SDR, Raspberry Pi, and rpitx.☆14May 13, 2020Updated 5 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆24Sep 4, 2017Updated 8 years ago