Material do curso de Hardware Hacking da ACADITI
☆23Jan 13, 2020Updated 6 years ago
Alternatives and similar repositories for Hardware-Hacking
Users that are interested in Hardware-Hacking are comparing it to the libraries listed below
Sorting:
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- Tutorial prático de pentest com Meterpreter (Metasploit)☆23May 11, 2018Updated 7 years ago
- Scripts used in python automation mini series on my youtube☆12Sep 10, 2020Updated 5 years ago
- WiFi QRCode Generator for LOLIN D32 Pro (Board based ESP32)☆15Feb 15, 2019Updated 7 years ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Differential Fuzzer to hunt for logic bugs on Perl Modules☆26Updated this week
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- ☆33Jan 18, 2026Updated 2 months ago
- Tool to perform brute force attack on TPLink routers☆16Jun 12, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Yet Another Filesystem☆17Nov 2, 2012Updated 13 years ago
- Battery-free emulator of the well-known iButton key based on ATtiny13.☆16Aug 25, 2024Updated last year
- A program for cloning RFID, Sub-GHz, and infrared signals like Flipper Zero, but simpler.☆14May 10, 2024Updated last year
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- ☆11Feb 8, 2024Updated 2 years ago
- A project repository to store documented experimentation on warwalking subject and look alikes, with affordable or popular hardware, code…☆20Jan 28, 2024Updated 2 years ago
- @tweet2doom data and tools☆22Feb 26, 2022Updated 4 years ago
- Automation playing freebitco.in per hours.☆13Jul 24, 2020Updated 5 years ago
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆21Aug 6, 2015Updated 10 years ago
- ☆17Aug 17, 2024Updated last year
- ☆54Mar 2, 2026Updated 2 weeks ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 4, 2026Updated 2 weeks ago
- ☆12Jan 28, 2023Updated 3 years ago
- Proposing security measures and security analysis in the Fiware IoT environment.☆22Oct 4, 2018Updated 7 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Tetris clone written in C☆20Mar 16, 2016Updated 10 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- uses the atom gps kit to wardrive and give status via the leds☆27Jan 12, 2024Updated 2 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 5 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- ☆20May 18, 2022Updated 3 years ago