A FREE comprehensive step-by-step 8-bit ATmega328P C and Assembler tutorial covering Embedded Software Development to Reverse Engineering.
☆11Nov 26, 2025Updated 3 months ago
Alternatives and similar repositories for Hacking-Bits
Users that are interested in Hacking-Bits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Nov 26, 2025Updated 3 months ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆27Nov 26, 2025Updated 3 months ago
- ☆18Nov 13, 2024Updated last year
- KevinSaber is a Oculus Rift and Oculus Quest game that is a BeatSaber clone where you strike the boxes as they fly past you in a fierce f…☆14Nov 27, 2025Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆29Nov 26, 2025Updated 3 months ago
- Thymeleaf File Upload example in Spring Boot - Bootstrap, Form, List of Files - Thymeleaf File Upload/Download example.☆13Nov 26, 2022Updated 3 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆37Nov 26, 2025Updated 3 months ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated 3 weeks ago
- An open-source Python Selenium Test Automation framework with Docker and Kubernetes integration.☆32Nov 26, 2025Updated 3 months ago
- Prebuilt binaries for Windows☆10Jan 26, 2024Updated 2 years ago
- #Badgelife☆20Oct 29, 2018Updated 7 years ago
- اداة باللغة العربية لإختراق الكاميرة الأمامية لأي جهاز و إلتقاط صور منها و حفظها كل هذا من خلال رابط ملغم فقط.☆23Jun 28, 2025Updated 8 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Notes and things regarding hacking DEFCON 26's badge☆28Sep 18, 2018Updated 7 years ago
- Deepfake Detector is an AI/ML model designed to detect AI-generated or manipulated images.☆33Nov 26, 2025Updated 3 months ago
- ☆11Jan 31, 2026Updated last month
- Make DSPy Agentic using protocol-first approach that support the Agent Protocols like MCP, A2A☆74May 27, 2025Updated 9 months ago
- Import Device Tree Information onto your Ghidra memory map☆33Updated this week
- Full transcripts for the Joe Rogan Experience podcast utilized in a VuePress site.☆44May 27, 2019Updated 6 years ago
- An interactive web app for exploring the Lockpickers United belt ranking system.☆40Updated this week
- Info about Amlogic S905W2☆13May 9, 2024Updated last year
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆41Jun 20, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This project is a CRUD (Create, Read, Update, Delete) API built with Go, GraphQL, and PostgreSQL.☆19Feb 6, 2025Updated last year
- Demo project which uses SAM and AWS lambda to test lambdas locally☆14Nov 29, 2020Updated 5 years ago
- Very simple 8 bits huffman encoder/decoder with pure C.☆16May 29, 2023Updated 2 years ago
- ☆26Apr 28, 2022Updated 3 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆164Nov 26, 2025Updated 3 months ago
- ☆19May 16, 2019Updated 6 years ago
- C++ implementation for all sorts of geometric algorithm☆16Apr 1, 2019Updated 6 years ago
- اداة باللغة العربية لتحميل اساسيات ترمكس☆51Jan 24, 2022Updated 4 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆58Apr 30, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆17Aug 16, 2016Updated 9 years ago
- DDS workshops at DEFCON☆90Aug 8, 2024Updated last year
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆40Apr 24, 2025Updated 11 months ago
- ☆14Jun 27, 2025Updated 8 months ago
- Binary Golf Grand Prix☆86Mar 14, 2026Updated last week
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- ☆14Apr 10, 2024Updated last year