0xbharath / hardware-hacking-for-software-folks
☆40Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for hardware-hacking-for-software-folks
- ☆65Updated last month
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated last year
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆27Updated 5 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 6 years ago
- Advanced: Bluetooth low energy capture the flag☆53Updated last year
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- Content related to hardware hacking☆46Updated 5 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆68Updated 3 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆49Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆31Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- ☆52Updated 2 months ago
- A list of resources for those interested in hardware, embedded, and IoT security☆57Updated last month
- An arduino UARTFuzzer☆42Updated 2 years ago
- Firmware analysis website + API☆42Updated 4 years ago
- BLEMystique is an ESP32 based custom BLE target☆15Updated 5 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- Resources for learning about application security☆54Updated 7 years ago
- ☆13Updated 5 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 3 months ago
- miscellaneous stuff☆21Updated 9 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆56Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago