Material do curso de Hardware Hacking da ACADITI
☆23Jan 13, 2020Updated 6 years ago
Alternatives and similar repositories for Hardware-Hacking
Users that are interested in Hardware-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- A GIF image decoder designed to allow GIF images to be read and displayed by a small microcontroller.☆12Dec 20, 2022Updated 3 years ago
- Scripts used in python automation mini series on my youtube☆12Sep 10, 2020Updated 5 years ago
- WiFi QRCode Generator for LOLIN D32 Pro (Board based ESP32)☆15Feb 15, 2019Updated 7 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆26Jan 7, 2024Updated 2 years ago
- Gerando QRCode com Python☆10Jul 5, 2024Updated last year
- Simple and pratical security gate for Github Security Alerts☆21May 11, 2026Updated last week
- DEPRECATED. See https://github.com/nfcgate/nfcgate.☆17May 12, 2022Updated 4 years ago
- ☆34Jan 18, 2026Updated 4 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Listando seguidores do Instagram com Python☆13Feb 13, 2021Updated 5 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆20Aug 6, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Jan 28, 2023Updated 3 years ago
- Fake Wifi AP using ESP32 and ESPAsyncWebServer for hosting static web payloads.☆17Apr 22, 2023Updated 3 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- 🍍 Complete bash function cheat sheet for WiFi Pineapple Pager! Includes visual diagrams, code examples, and interactive docs - everythin…☆45Feb 6, 2026Updated 3 months ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 3 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- O ESPhishing é um ataque de captive portal que é executado na placa de desenvolvimento NodeMCU com o microcontrolador ESP8266. É uma ferr…☆150Oct 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 3 years ago
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 5 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- ☆12Updated this week
- Repositório criado com intuito de reunir templates da ferramenta Nuclei dentro do contexto Brasil☆84Nov 22, 2022Updated 3 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆95May 20, 2021Updated 5 years ago
- ☆74Jan 2, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository contain some datas about CVE's updated hourly, to help community Prioritize, based in sources the Threat Intelligence in …☆31Updated this week
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.☆16Mar 25, 2026Updated last month
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago