arunmagesh / hw_hacking_cheatsheetView external linksLinks
Hardware Hacking Cheatsheet infograph
☆157Feb 19, 2024Updated last year
Alternatives and similar repositories for hw_hacking_cheatsheet
Users that are interested in hw_hacking_cheatsheet are comparing it to the libraries listed below
Sorting:
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- this is a complete guide if you want to become in a black hat hacker but remember this is illegal☆12May 30, 2024Updated last year
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Dec 18, 2017Updated 8 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Jun 30, 2021Updated 4 years ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 5 months ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- ☆369Jul 7, 2024Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆24Feb 14, 2024Updated 2 years ago
- Purpose-built Red Team network hardware implant made from common components.☆25Mar 18, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Collection of projects for adding GNURadio to a REDHAWK Domain as a Component, thus enabling easy installation of flowgraphs into REDHAWK…☆14Jul 15, 2019Updated 6 years ago
- CANoolder: CAN to 3.3V logic level interface. Dumb. Cheap. Simple. Pick 3.☆15Feb 14, 2018Updated 8 years ago
- ☆11Apr 16, 2016Updated 9 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Lecture notes for the Hardware and Embedded Systems Security lecture☆80Apr 27, 2023Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆72Jun 3, 2025Updated 8 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- Hardware + Software for RF Hacking☆116Oct 28, 2017Updated 8 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- Hardware PenTesting ToolKit for RPi and Arduino☆18Jun 12, 2020Updated 5 years ago
- ☆11Jan 7, 2018Updated 8 years ago
- SLE 4442 smartcard emulation on an AVR☆14Apr 20, 2020Updated 5 years ago
- Scanner for public s3 buckets☆11Oct 23, 2017Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Content related to hardware hacking☆56Mar 28, 2019Updated 6 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Jan 3, 2023Updated 3 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Aug 5, 2023Updated 2 years ago