A Wiki about Hardware Hacking
☆463Dec 14, 2025Updated 4 months ago
Alternatives and similar repositories for HardBreak
Users that are interested in HardBreak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ⚔️ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.☆27Apr 28, 2025Updated last year
- Air Script is a powerful Wi-Fi auditing tool with optional email alerts for captured handshakes.☆179Nov 22, 2025Updated 5 months ago
- A curated list of cybersecurity tools and resources.☆2,166Updated this week
- ☆11Oct 24, 2024Updated last year
- World's first Nintendo 3DS emulator for Apple devices based on Citra.☆18Apr 7, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A experimental cli tool to encrypt & decrypt files/directories.☆35Dec 30, 2025Updated 4 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆34Sep 21, 2024Updated last year
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆243Aug 1, 2024Updated last year
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆336Feb 17, 2023Updated 3 years ago
- ☆16Jun 4, 2025Updated 10 months ago
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆208Oct 1, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Interactive Python CLI that wraps Hashcat with guided menus for wordlist, rule-based, brute-force, and hybrid attacks. Supporting 300+ ha…☆220Apr 17, 2026Updated 2 weeks ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆684Mar 5, 2026Updated last month
- YellowDotDecode is a graphical application that decodes the hidden information embedded in the yellow dots printed by some printers. Thes…☆24Apr 22, 2025Updated last year
- Post-exploitation framework that abuses trusted sites like Telegram and Discord for C2.☆46Apr 24, 2026Updated last week
- This repository documents the creation of a 3x3x12 LED matrix that enables users to play a fully functional 3D Tetris game. The project …☆11Feb 9, 2025Updated last year
- Quickly connect to WiFi by scanning text, no typing needed☆67Jan 19, 2026Updated 3 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆465Dec 12, 2025Updated 4 months ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆27Apr 19, 2025Updated last year
- An open-source benchmark for evaluating AI agents' ability to find backdoors hidden in compiled binaries.☆88Feb 27, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Gridt - A highly customizable CSS Grid overlay for web developers☆21Mar 5, 2025Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 9 months ago
- Personal Blog. Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.☆11Sep 13, 2023Updated 2 years ago
- Automatically extract documents from images and perspectively correct them with classic computer-vision algorithms. In maintenance mode. …☆87Aug 24, 2025Updated 8 months ago
- ☆57Jul 6, 2025Updated 9 months ago
- Shodan Dorks☆506Apr 21, 2026Updated last week
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 8 months ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 5 years ago
- An easy and fast way to create a Python GUI 🐍 | This software allows you to create complex UI faster than ever⚡☆180Jan 19, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- USB HID device support for embedded devices☆14Feb 2, 2020Updated 6 years ago
- ☆15Nov 5, 2022Updated 3 years ago
- 一个网络安全法律法规、安全政策、国家标准、行业标准知识库。A knowledge base of cybersecurity laws and regulations, security policies, national standards, and industry …☆99Feb 8, 2026Updated 2 months ago
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆623Jul 21, 2025Updated 9 months ago
- Find and get started with the best AI Agents and AI Automation tools on the Internet. Start building your own AI Agents powered workforce…☆39Dec 27, 2024Updated last year
- List of Bluetooth BR/EDR/LE security resources☆602Oct 3, 2025Updated 6 months ago
- ☆402Jul 7, 2024Updated last year