koutto / hardware-hacking
Some stuff about Hardware Hacking
☆585Updated 8 months ago
Alternatives and similar repositories for hardware-hacking:
Users that are interested in hardware-hacking are comparing it to the libraries listed below
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- List of the tools and usage☆232Updated 2 years ago
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- A Bluetooth low energy capture the flag☆688Updated 7 months ago
- A sniffer for Bluetooth 5 and 4.x LE☆947Updated 2 months ago
- Hands-on workshop on the basics of hardware hacking.☆118Updated last year
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆725Updated 7 months ago
- A Virtual environment for Pentesting IoT Devices☆422Updated last year
- A U-Boot hacking toolkit for security researchers and tinkerers☆267Updated last year
- Hardware Hacking Cheatsheet infograph☆149Updated last year
- $50 Million CTF from Hackerone - Writeup☆590Updated 5 years ago
- Course materials for hackaday.io Ghidra training☆391Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆102Updated 4 years ago
- ☆182Updated 5 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆741Updated 3 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆410Updated 2 years ago
- Utility to find AES keys in running processes☆334Updated last year
- Learning Shodan through katas☆465Updated 4 years ago
- Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be…☆741Updated last year
- The Web Application Hacker's Handbook - Extra Content☆548Updated last year
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆833Updated 3 months ago
- Tools, data, and contact lists relevant to The disclose.io Project.☆326Updated last year
- TESLA PowerWall 2 Security Shenanigans☆459Updated 10 months ago
- A collection of pwn/CTF related utilities for Ghidra☆670Updated 6 months ago
- Implement your own USB device in Python, supported by a hardware peripheral such as Cynthion or GreatFET☆818Updated last month
- Rhme2 challenge (2016)☆315Updated 7 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- GPU rootkit PoC by Team Jellyfish☆116Updated 9 years ago