koutto / hardware-hacking
Some stuff about Hardware Hacking
☆583Updated 7 months ago
Alternatives and similar repositories for hardware-hacking:
Users that are interested in hardware-hacking are comparing it to the libraries listed below
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- List of the tools and usage☆232Updated 2 years ago
- A Bluetooth low energy capture the flag☆685Updated 7 months ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆738Updated 2 months ago
- Hardware Hacking Cheatsheet infograph☆149Updated last year
- VSS Hardware Hacking Wiki and Blog Entries☆240Updated last year
- Course materials for hackaday.io Ghidra training☆388Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆940Updated 2 months ago
- Implement your own USB device in Python, supported by a hardware peripheral such as Cynthion or GreatFET☆815Updated last month
- ☆229Updated last year
- A Virtual environment for Pentesting IoT Devices☆423Updated 11 months ago
- Tools, data, and contact lists relevant to The disclose.io Project.☆327Updated last year
- Why not run micropython on your EMFI tool?☆546Updated 6 months ago
- Utility to find AES keys in running processes☆334Updated last year
- Learning Shodan through katas☆464Updated 4 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,337Updated last month
- Hands-on workshop on the basics of hardware hacking.☆118Updated last year
- A U-Boot hacking toolkit for security researchers and tinkerers☆266Updated last year
- Tracking history of USB events on GNU/Linux☆1,162Updated 2 years ago
- Kinda useful notes collated together publicly☆492Updated 5 years ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆340Updated 9 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆797Updated 2 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆284Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆56Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆407Updated 2 years ago
- ☆569Updated last week
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆724Updated 6 months ago
- ☆299Updated 8 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆102Updated 4 years ago