A FREE comprehensive step-by-step embedded hacking course covering Embedded Software Development to Reverse Engineering.
☆197Apr 12, 2026Updated last week
Alternatives and similar repositories for Embedded-Hacking
Users that are interested in Embedded-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆44Nov 26, 2025Updated 4 months ago
- A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of …☆222Apr 12, 2026Updated last week
- An open-source Python Selenium Test Automation framework with Docker and Kubernetes integration.☆32Nov 26, 2025Updated 4 months ago
- Inspired by Andrej Karpathy’s "Let’s Build GPT", this project guides you step‑by‑step to build a GPT from scratch, demystifying its archi…☆28Dec 12, 2025Updated 4 months ago
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Nov 26, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18May 9, 2020Updated 5 years ago
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- A humble list of hardware hacking tools and resources curated by yours truly☆15Feb 28, 2022Updated 4 years ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆19Nov 8, 2024Updated last year
- ESP8266 Based WiFi Deauther with more features (like: WebConsole, WebConverter)☆10Jan 3, 2023Updated 3 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 4 months ago
- ☆43Oct 28, 2016Updated 9 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Facebook Bruteforce tool on python 🔐☆15Oct 14, 2024Updated last year
- Professional Open Source Intelligence Platform☆15Sep 15, 2025Updated 7 months ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆165Nov 26, 2025Updated 4 months ago
- Exploits written while preparing for the OSED exam☆24Apr 30, 2024Updated last year
- Herramienta completa de Scrapping en la Deep Web☆17Jul 24, 2025Updated 8 months ago
- Hands-on workshop on the basics of hardware hacking.☆123Sep 5, 2023Updated 2 years ago
- Files and Programs for UAV and Drone Cybersecurity Workshop☆38Sep 6, 2023Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- ESP8266 and EPS32 firmware binaries analysis toolkit☆74Oct 30, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 5 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆21Aug 17, 2022Updated 3 years ago
- Experiments getting a Cypress FX3 SuperSpeed USB3 dev kit to behave as a logic analyzer.☆29Oct 2, 2017Updated 8 years ago
- A tool that deauthenticates 2.4GHz and 5GHz Wi-Fi networks using BW16.☆22Nov 17, 2025Updated 5 months ago
- A list of hacking/security resources that are focused on IoT☆62Dec 6, 2022Updated 3 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- ☆399Jul 7, 2024Updated last year
- Tiny Embedded File System for Microcontrollers☆14Mar 23, 2017Updated 9 years ago
- Damn Vulnerable CICS Application☆32Mar 2, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆57Apr 21, 2025Updated 11 months ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆16Aug 27, 2022Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- Scripts to make life easier☆12Jun 16, 2020Updated 5 years ago
- ☆26Jun 2, 2023Updated 2 years ago