A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
☆4,100Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for magspoof
Users that are interested in magspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,450Nov 26, 2018Updated 7 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,260Jan 11, 2017Updated 9 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,122Mar 2, 2017Updated 9 years ago
- OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy☆881Mar 15, 2026Updated last week
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆112Jul 29, 2016Updated 9 years ago
- A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless o…☆1,805Nov 21, 2017Updated 8 years ago
- Digital Ding Dong Ditch -- RTL-SDR + Arduino + GSM/SMS/FONA + RF + GQRX to hack a wireless doorbell from a text message☆251Jul 17, 2021Updated 4 years ago
- Port of Samy Kamkar's MagSpoof project (http://samy.pl/magspoof/) to the Flipper Zero. Enables wireless emulation of magstripe data, prim…☆689Apr 2, 2025Updated 11 months ago
- A collection of hacking / penetration testing resources to make you better!☆303Sep 24, 2020Updated 5 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,292Dec 19, 2025Updated 3 months ago
- A curated list of awesome resources for electronic engineers and hobbyists☆70Jan 31, 2017Updated 9 years ago
- MagSpoof for Raspberry PI GPIO☆66Oct 9, 2016Updated 9 years ago
- Magspoof R3 - Wireless magnetic stripe emulator☆69Oct 25, 2018Updated 7 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,665Updated this week
- The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd…☆3,882Dec 26, 2025Updated 2 months ago
- RfCat - swiss-army knife of ISM band radio☆25Feb 9, 2022Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 3 weeks ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆614Jul 30, 2025Updated 7 months ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆45Sep 27, 2015Updated 10 years ago
- NFC Copy Cat is a small device that combines two powerful cybersecurity tools, NFCopy and MagSpoof. NFCopy works by reading or emulating …☆137Jun 14, 2023Updated 2 years ago
- Offline radio signal analyser☆46May 3, 2020Updated 5 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,352Jan 22, 2017Updated 9 years ago
- 3D reproduction of TSA Master keys☆3,240May 25, 2022Updated 3 years ago
- RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC☆34Jul 13, 2023Updated 2 years ago
- High-precision indoor positioning framework for most wifi-enabled devices.☆5,090Sep 7, 2022Updated 3 years ago
- Motorized, portable, 3D printed, Arduino-based combination lock cracker☆243Aug 1, 2019Updated 6 years ago
- The Rogue Access Point Framework☆14,513Feb 4, 2025Updated last year
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- U2F USB token optimized for physical security, affordability, and style☆2,449Sep 1, 2022Updated 3 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆361Jul 30, 2015Updated 10 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,572Mar 1, 2024Updated 2 years ago
- NAT Pinning exploit tool for penetration testers.☆34Jan 20, 2014Updated 12 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswal…☆1,861Aug 29, 2023Updated 2 years ago
- WarBerryPi - Tactical Exploitation☆2,227Nov 9, 2019Updated 6 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,606Apr 18, 2024Updated last year
- Wireless magnetic card emulation☆14Sep 21, 2019Updated 6 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,321Jul 27, 2021Updated 4 years ago
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,242Apr 12, 2022Updated 3 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago