souravbaghz / AwesomeHardwareHackingLinks
Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links only.
☆54Updated 3 years ago
Alternatives and similar repositories for AwesomeHardwareHacking
Users that are interested in AwesomeHardwareHacking are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- ☆47Updated 7 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- ☆42Updated last month
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆52Updated 9 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Notes from OSCP, CTF, security adventures, etc...☆60Updated last year
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- ☆24Updated last year
- Repositories, Links, Payloads, Blogs, Tools, etc.. which I think might be useful for pentesting and bug bounty☆26Updated 2 years ago
- Compilation of Cyber Security Cheat Sheets☆25Updated 4 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Hi everyone,☆59Updated last year
- ☆96Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆104Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- ☆30Updated 3 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆55Updated last year
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆14Updated 4 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆80Updated 7 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated last month
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- Google Dorking Payloads☆11Updated 11 months ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago