BrownFineSecurity / hacking-docs
Hacking Reference Documentation
☆27Updated 8 months ago
Alternatives and similar repositories for hacking-docs
Users that are interested in hacking-docs are comparing it to the libraries listed below
Sorting:
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆77Updated 6 months ago
- a set of scripts and tools for various firmware analysis tasks☆58Updated last month
- ☆23Updated 2 months ago
- Bluetooth Security Assessment Methodology☆128Updated 11 months ago
- ☆16Updated last year
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆23Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 5 years ago
- uses the atom gps kit to wardrive and give status via the leds☆26Updated last year
- Files and Programs for UAV and Drone Cybersecurity Workshop☆31Updated last year
- Place to store my various exposed IoT cam-scanning work and info☆19Updated last year
- Collection of FCC IDs for car keyfobs☆47Updated last month
- Detect Stalkers with Wardriving, using Python☆38Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆45Updated 2 years ago
- Crack passwords with Hashcat using a Discord Bot.☆25Updated last year
- Proof of Concept for CVE-2023-22906☆7Updated last year
- An Open-Source Door Simulator for RFID/PACS Training☆123Updated 6 months ago
- ☆123Updated last year
- ☆11Updated 2 years ago
- ☆20Updated 6 months ago
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆21Updated 5 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆35Updated 2 months ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆83Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 10 months ago
- A compact and portable WiFi reconnaissance suite based on the ESP8266☆114Updated 2 years ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆46Updated 11 months ago
- Evil Crow Cable Pro device☆111Updated last month
- .sub files for the LED bracelets distributed at DEFCON☆16Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year