koutto / hardware-hacking
Some stuff about Hardware Hacking
☆565Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for hardware-hacking
- SkySafe Miscellaneous Reverse Engineering Blog☆759Updated 9 months ago
- List of the tools and usage☆231Updated last year
- Course materials for hackaday.io Ghidra training☆374Updated 10 months ago
- A Bluetooth low energy capture the flag☆671Updated 3 months ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆394Updated 2 months ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆337Updated 5 months ago
- Hands-on workshop on the basics of hardware hacking.☆114Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,317Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆694Updated this week
- A sniffer for Bluetooth 5 and 4.x LE☆859Updated last week
- Collection of pentesting scripts☆429Updated 2 years ago
- Kinda useful notes collated together publicly☆492Updated 5 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆883Updated 4 years ago
- Tracking history of USB events on GNU/Linux☆1,154Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆98Updated 4 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆257Updated last year
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆617Updated 4 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆760Updated last week
- Public library of space documents and tutorials☆724Updated 6 months ago
- Fully dockerized Linux kernel debugging environment☆737Updated last month
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆794Updated 2 years ago
- Utility to find AES keys in running processes☆328Updated last year
- Hardware Hacking Cheatsheet infograph☆144Updated 8 months ago
- The Web Application Hacker's Handbook - Extra Content☆546Updated last year
- ☆265Updated 4 months ago
- ☆144Updated 4 years ago
- VSS Hardware Hacking Wiki and Blog Entries☆232Updated 10 months ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆453Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆413Updated 7 months ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago