koutto / hardware-hacking
Some stuff about Hardware Hacking
☆579Updated 6 months ago
Alternatives and similar repositories for hardware-hacking:
Users that are interested in hardware-hacking are comparing it to the libraries listed below
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- A Bluetooth low energy capture the flag☆683Updated 6 months ago
- List of the tools and usage☆232Updated 2 years ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆404Updated 6 months ago
- Utility to find AES keys in running processes☆334Updated last year
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆703Updated 6 months ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆453Updated 2 years ago
- VSS Hardware Hacking Wiki and Blog Entries☆238Updated last year
- Hands-on workshop on the basics of hardware hacking.☆118Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆927Updated last month
- ☆146Updated 4 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆288Updated 3 years ago
- ☆229Updated last year
- Learning Shodan through katas☆464Updated 4 years ago
- Hardware Hacking Cheatsheet infograph☆147Updated last year
- A Virtual environment for Pentesting IoT Devices☆422Updated 10 months ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆802Updated 5 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆731Updated 2 months ago
- Kinda useful notes collated together publicly☆492Updated 5 years ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago
- Obuscated C Christmas programs☆377Updated 2 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆265Updated last year
- EMBArk - The firmware security scanning environment☆328Updated this week
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆282Updated 2 years ago
- Implement your own USB device in Python, supported by a hardware peripheral such as Cynthion or GreatFET☆809Updated 2 weeks ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆291Updated 2 years ago
- Course materials for hackaday.io Ghidra training☆387Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆406Updated 2 years ago
- ☆565Updated last week
- Extract files from any kind of container formats☆2,275Updated this week