BusesCanFly / HardwareHackingForTheMassesLinks
Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"
☆30Updated 6 years ago
Alternatives and similar repositories for HardwareHackingForTheMasses
Users that are interested in HardwareHackingForTheMasses are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆35Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- ☆70Updated 3 months ago
- Password Guessing for different Web Portals☆29Updated 7 years ago
- Collection of tips, tools and tutorials around infosec☆31Updated 8 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- Rogue Access Point Detector☆37Updated last year
- Automated 802.1x Bypass☆86Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- ☆122Updated 7 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 11 months ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- I'll post my custom shellcode I make here!☆22Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago