Material do curso de Hardware Hacking da ACADITI
☆23Jan 13, 2020Updated 6 years ago
Alternatives and similar repositories for Hardware-Hacking
Users that are interested in Hardware-Hacking are comparing it to the libraries listed below
Sorting:
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Material utilizado na Live sobre Buffer Overflow☆10Aug 10, 2018Updated 7 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- Gerando QRCode com Python☆10Jul 5, 2024Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Repo for my new website and README☆14Jan 11, 2025Updated last year
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Dark web related material☆24May 19, 2025Updated 9 months ago
- Battery-free emulator of the well-known iButton key based on ATtiny13.☆16Aug 25, 2024Updated last year
- Resources to learn tech (sharing useful links)☆17Oct 26, 2021Updated 4 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆14Mar 27, 2024Updated last year
- ☆10Feb 26, 2023Updated 3 years ago
- Listando seguidores do Instagram com Python☆13Feb 13, 2021Updated 5 years ago
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆40Dec 19, 2025Updated 2 months ago
- NFC MiTM made with two PN532 readers and a Raspberry PI. Created by Aleksei Stennikov.☆55Oct 14, 2021Updated 4 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Download Telegram group media with Python Telethon tutorial☆11Nov 22, 2021Updated 4 years ago
- A sophisticated Gradio-based application for generating adult content prompts using uncensored AI models. Designed for content creators o…☆28Jun 3, 2025Updated 8 months ago
- Meus projetos pessoais☆13Dec 3, 2015Updated 10 years ago
- Mastering AI in Cybersecurity: From Theory to Practice.☆16Dec 17, 2024Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- WiFi QRCode Generator for LOLIN D32 Pro (Board based ESP32)☆15Feb 15, 2019Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Dashboard de Monitoramento de Host☆25Sep 19, 2025Updated 5 months ago
- O ESPhishing é um ataque de captive portal que é executado na placa de desenvolvimento NodeMCU com o microcontrolador ESP8266. É uma ferr…☆146Oct 22, 2023Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆21Jan 6, 2023Updated 3 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Elastic 2022☆11Feb 14, 2022Updated 4 years ago
- ☆17Aug 17, 2024Updated last year
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Fake Wifi AP using ESP32 and ESPAsyncWebServer for hosting static web payloads.☆17Apr 22, 2023Updated 2 years ago
- Tutorial prático de pentest com Meterpreter (Metasploit)☆22May 11, 2018Updated 7 years ago