The HID iClass line of proximity cards and readers, known for its encryption and mutual authentication, has a vulnerability that allows retrieval of the master authentication key, enabling cloning of cards and changing reader settings. The method involves exploiting debug pins on specific readers to modify firmware and extract the key.
FEATURES
SIMILAR TOOLS
A project providing open-source YARA rules for malware and malicious file detection
A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.
A library for running basic functions from stripped binaries cross platform.
Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.
Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.
Largest open collection of Android malware samples, with 298 samples and contributions welcome.
A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.