Proxmark III is a tool for testing and analyzing RFID and NFC tags. It allows users to read and write data to tags, as well as perform various attacks and tests. It is a powerful tool for testing the security of RFID and NFC systems, and can be used to identify vulnerabilities and weaknesses. The Proxmark III is a versatile tool that can be used in a variety of settings, from testing the security of RFID systems in retail stores to identifying vulnerabilities in NFC-enabled devices. It is an essential tool for anyone working in the field of RFID and NFC security, and is a valuable resource for anyone looking to test and analyze the security of these systems.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A quick reference guide for the VI editor, covering commands and modes.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.
A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.
A pocket reference guide providing various options for navigating and pivoting through different environments and situations.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.