koutto / hardware-hackingLinks
Some stuff about Hardware Hacking
☆595Updated 10 months ago
Alternatives and similar repositories for hardware-hacking
Users that are interested in hardware-hacking are comparing it to the libraries listed below
Sorting:
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- List of the tools and usage☆234Updated 2 years ago
- A Bluetooth low energy capture the flag☆697Updated 9 months ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆408Updated 9 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- Utility to find AES keys in running processes☆336Updated 2 years ago
- Hardware Hacking Cheatsheet infograph☆151Updated last year
- A Virtual environment for Pentesting IoT Devices☆427Updated last year
- Course materials for hackaday.io Ghidra training☆399Updated last year
- Kinda useful notes collated together publicly☆493Updated 6 years ago
- Learning Shodan through katas☆465Updated 4 years ago
- Public library of space documents and tutorials☆789Updated last year
- Tools, data, and contact lists relevant to The disclose.io Project.☆327Updated last year
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆777Updated 7 months ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆843Updated last month
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆799Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Hack A Sat 2020 Qualifier Challenges☆101Updated 2 years ago
- Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be…☆755Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆986Updated 4 months ago
- VSS Hardware Hacking Wiki and Blog Entries☆247Updated last year
- EMBArk - The firmware security scanning environment☆341Updated last week
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- ☆310Updated 10 months ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 4 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆735Updated 9 months ago
- Reverse engineering basics in puzzle form☆184Updated 5 years ago
- ☆182Updated 5 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆420Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆772Updated 5 months ago