List of the tools and usage
☆235Jul 4, 2025Updated 9 months ago
Alternatives and similar repositories for List-of-Tools
Users that are interested in List-of-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆73Aug 19, 2025Updated 7 months ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 7 months ago
- A Virtual environment for Pentesting IoT Devices☆444Aug 25, 2025Updated 7 months ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- EMBA - The firmware security analyzer☆3,418Apr 2, 2026Updated last week
- Proxmark3 rvd4.0 adaptation based iceman fork☆14Sep 3, 2018Updated 7 years ago
- A Curated list of Security Resources for all connected things☆3,232Mar 7, 2026Updated last month
- Side-channel attac☆10Mar 25, 2022Updated 4 years ago
- Z-Wave Packet Interception and Injection Tool☆37Nov 4, 2015Updated 10 years ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Sep 18, 2022Updated 3 years ago
- Attify OS - Distro for pentesting IoT devices☆1,025Aug 26, 2021Updated 4 years ago
- DEFCON 28 Projects☆13Dec 15, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Aug 10, 2022Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆346May 27, 2024Updated last year
- A curated list of awesome embedded and IoT security resources.☆2,282Oct 17, 2023Updated 2 years ago
- Make your Ghidra Lazy!☆156Aug 27, 2020Updated 5 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- OWASP IoT Top 10 2018 Mapping Project☆22Oct 16, 2019Updated 6 years ago
- ☆13Sep 22, 2025Updated 6 months ago
- 🐝 Zigbee security research toolkit for the RaspBee, nRF52840 and CC2531 radio modules.☆34Feb 8, 2020Updated 6 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- ☆17Oct 21, 2023Updated 2 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- Damn Vulnerable IoT Device☆218Feb 12, 2024Updated 2 years ago
- IoT固件漏洞挖掘工具☆247Nov 11, 2022Updated 3 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Some stuff about Hardware Hacking☆618Jul 25, 2024Updated last year
- convert luac to lua source☆15Dec 20, 2024Updated last year
- PENIOT: Penetration Testing Tool for IoT☆231Feb 22, 2022Updated 4 years ago
- A RADIUS authentication server audit tool☆79Oct 15, 2018Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Nov 18, 2019Updated 6 years ago
- One command to boot the QEMU system☆37Sep 7, 2022Updated 3 years ago