Proxmark III is a tool for testing and analyzing RFID and NFC tags. It allows users to read and write data to tags, as well as perform various attacks and tests. It is a powerful tool for testing the security of RFID and NFC systems, and can be used to identify vulnerabilities and weaknesses. The Proxmark III is a versatile tool that can be used in a variety of settings, from testing the security of RFID systems in retail stores to identifying vulnerabilities in NFC-enabled devices. It is an essential tool for anyone working in the field of RFID and NFC security, and is a valuable resource for anyone looking to test and analyze the security of these systems.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A structured approach to managing and responding to suspected security events or incidents.
A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.
A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.
A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.