CyberSecurityUP / Awesome-Hardware-and-IoT-Hacking
☆309Updated 10 months ago
Alternatives and similar repositories for Awesome-Hardware-and-IoT-Hacking
Users that are interested in Awesome-Hardware-and-IoT-Hacking are comparing it to the libraries listed below
Sorting:
- Hardware Hacking Cheatsheet infograph☆150Updated last year
- Hands-on workshop on the basics of hardware hacking.☆121Updated last year
- Hardware/IOT Pentesting Wiki☆621Updated this week
- ☆119Updated 2 years ago
- ☆439Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆427Updated last year
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆53Updated 3 years ago
- ☆178Updated 4 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆214Updated last year
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- Resources for learning about Exploit Development☆389Updated 4 years ago
- Bluetooth Security Assessment Methodology☆126Updated 11 months ago
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆208Updated 9 months ago
- Collection of USB hacking links and materials for my talk on the topic☆313Updated 6 months ago
- ☆140Updated 2 months ago
- Practical Hardware Pentesting, published by Packt☆71Updated 2 years ago
- ☆96Updated 3 years ago
- Resources for learning about cybersecurity and CTFs☆207Updated 2 years ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆184Updated this week
- Work in progress...☆490Updated 7 months ago
- The best resources for learning exploit development☆114Updated 5 years ago
- A curated list of awesome Memory Forensics for DFIR☆435Updated 2 months ago
- A list of resources for those interested in hardware, embedded, and IoT security☆67Updated 7 months ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆341Updated last year
- A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.☆146Updated 9 months ago
- Learn Binary Exploitation with sample problems and solutions☆144Updated 2 years ago
- Collection of writeups on ICS/SCADA security.☆171Updated last month
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆100Updated 7 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆92Updated 4 months ago
- List of Bluetooth BR/EDR/LE security resources☆551Updated last year