Hands-on workshop on the basics of hardware hacking.
☆123Sep 5, 2023Updated 2 years ago
Alternatives and similar repositories for hardware-hacking
Users that are interested in hardware-hacking are comparing it to the libraries listed below
Sorting:
- the most basic introduction to performing a Vcc glitch attack☆26Sep 25, 2017Updated 8 years ago
- Companion notebooks to the Hardware Hacking Handbook☆85Oct 17, 2021Updated 4 years ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- Kali Linux ™ build tool targeted for Hardware Hacking tools☆40Jul 19, 2024Updated last year
- ☆17Feb 15, 2022Updated 4 years ago
- Slides and stuffs of the meetings during the 2020.☆16Jan 18, 2022Updated 4 years ago
- Sleep Obfuscation in Rust☆278Dec 1, 2025Updated 3 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- ☆22May 24, 2024Updated last year
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- KLEE Symbolic Execution Engine☆61Oct 27, 2019Updated 6 years ago
- Assembly block for hooking windows API functions.☆94Jul 16, 2019Updated 6 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆185Aug 2, 2023Updated 2 years ago
- ☆171Aug 6, 2020Updated 5 years ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆10Feb 5, 2024Updated 2 years ago
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- ☆96Aug 3, 2025Updated 7 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 4 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- A humble list of hardware hacking tools and resources curated by yours truly☆14Feb 28, 2022Updated 4 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It…☆15Feb 27, 2025Updated last year