koutto / hardware-hackingLinks
Some stuff about Hardware Hacking
☆601Updated 11 months ago
Alternatives and similar repositories for hardware-hacking
Users that are interested in hardware-hacking are comparing it to the libraries listed below
Sorting:
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- List of the tools and usage☆234Updated 2 weeks ago
- Course materials for hackaday.io Ghidra training☆401Updated last year
- Learning Shodan through katas☆465Updated 4 years ago
- Subaru StarLink persistent root code execution.☆568Updated 4 years ago
- Tools, data, and contact lists relevant to The disclose.io Project.☆327Updated last year
- ☆231Updated 2 years ago
- A Bluetooth low energy capture the flag☆700Updated 11 months ago
- $50 Million CTF from Hackerone - Writeup☆595Updated 6 years ago
- Utility to find AES keys in running processes☆336Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,168Updated 2 years ago
- VSS Hardware Hacking Wiki and Blog Entries☆249Updated last year
- Kinda useful notes collated together publicly☆495Updated 6 years ago
- Etherify - bringing the ether back to ethernet☆345Updated 3 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆271Updated 2 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆738Updated 10 months ago
- A Virtual environment for Pentesting IoT Devices☆429Updated 2 weeks ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆785Updated 7 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆848Updated 3 months ago
- Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be…☆763Updated last year
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- TESLA PowerWall 2 Security Shenanigans☆460Updated last year
- The Web Application Hacker's Handbook - Extra Content☆551Updated 2 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆781Updated 8 months ago
- Collection of pentesting scripts☆439Updated 3 years ago
- Hack-A-Sat Qualifiers Writeups☆253Updated 2 years ago
- Public library of space documents and tutorials☆795Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,356Updated 5 months ago