A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
☆4,092Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for magspoof
Users that are interested in magspoof are comparing it to the libraries listed below
Sorting:
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,445Nov 26, 2018Updated 7 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,259Jan 11, 2017Updated 9 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,120Mar 2, 2017Updated 9 years ago
- OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy☆879Dec 5, 2020Updated 5 years ago
- A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless o…☆1,801Nov 21, 2017Updated 8 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,252Dec 19, 2025Updated 2 months ago
- Digital Ding Dong Ditch -- RTL-SDR + Arduino + GSM/SMS/FONA + RF + GQRX to hack a wireless doorbell from a text message☆249Jul 17, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,661Sep 25, 2024Updated last year
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆110Jul 29, 2016Updated 9 years ago
- High-precision indoor positioning framework for most wifi-enabled devices.☆5,089Sep 7, 2022Updated 3 years ago
- The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd…☆3,866Dec 26, 2025Updated 2 months ago
- Port of Samy Kamkar's MagSpoof project (http://samy.pl/magspoof/) to the Flipper Zero. Enables wireless emulation of magstripe data, prim…☆682Apr 2, 2025Updated 11 months ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,352Jan 22, 2017Updated 9 years ago
- The Rogue Access Point Framework☆14,469Feb 4, 2025Updated last year
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,573Mar 1, 2024Updated 2 years ago
- A collection of hacking / penetration testing resources to make you better!☆302Sep 24, 2020Updated 5 years ago
- U2F USB token optimized for physical security, affordability, and style☆2,450Sep 1, 2022Updated 3 years ago
- 3D reproduction of TSA Master keys☆3,240May 25, 2022Updated 3 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆613Jul 30, 2025Updated 7 months ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Feb 27, 2018Updated 8 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,608Apr 18, 2024Updated last year
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,316Jul 27, 2021Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,225Nov 9, 2019Updated 6 years ago
- Magspoof R3 - Wireless magnetic stripe emulator☆69Oct 25, 2018Updated 7 years ago
- A curated list of awesome resources for electronic engineers and hobbyists☆69Jan 31, 2017Updated 9 years ago
- [ab]using Unicode to create tragedy☆3,756Sep 17, 2023Updated 2 years ago
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,237Apr 12, 2022Updated 3 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,941Mar 22, 2024Updated last year
- A hacky debugger UI for hackers☆6,351Jan 30, 2025Updated last year
- Sniffing browser history using HSTS☆936Aug 5, 2017Updated 8 years ago
- Community guide to securing and improving privacy on macOS.☆22,475Jan 2, 2026Updated 2 months ago
- MagSpoof for Raspberry PI GPIO☆66Oct 9, 2016Updated 9 years ago
- This program show you IMSI numbers of cellphones around you.☆3,785Dec 30, 2025Updated 2 months ago
- Web Debugging Proxy based on Chrome DevTools Network panel.☆4,564Nov 23, 2021Updated 4 years ago
- 🔑🔥📈 Next Level PGP☆3,468Mar 27, 2019Updated 6 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,153Apr 18, 2020Updated 5 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswal…☆1,859Aug 29, 2023Updated 2 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,883Updated this week