MagSpoof is a device that can spoof/emulate any magnetic stripe or credit card. It can work "wirelessly", even on standard magstripe/credit card readers, by generating a strong electromagnetic field that emulates a traditional magnetic stripe card. Note: MagSpoof does not enable you to use credit cards that you are not legally authorized to use. The Chip-and-PIN and Amex information is not implemented and using MagSpoof requires you to have/own the magstripes that you wish to emulate. Simply having a credit card number and expiration is not enough to perform transactions. MagSpoof does allow you to perform research in other areas of magstripes, microcontrollers, and electromagnetism, as well as learn about and create
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A post-exploitation tool for Azure Active Directory and Office 365 environments that manages access tokens and provides interactive access to Microsoft 365 services.
An open source network penetration testing framework with automatic recon and scanning capabilities.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
Tool for exploiting Sixnet RTUs to gain root level access with little effort.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
A free, safe, and legal training ground for ethical hackers to test and expand their skills
A login cracker that can be used to crack many types of authentication protocols.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.