souravbaghz / AwesomeHardwareHackingLinks
Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links only.
☆53Updated 3 years ago
Alternatives and similar repositories for AwesomeHardwareHacking
Users that are interested in AwesomeHardwareHacking are comparing it to the libraries listed below
Sorting:
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 6 months ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Updated 4 years ago
- ☆99Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆104Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- IoT Hacking Kit Details☆18Updated 8 months ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆50Updated 4 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- ☆29Updated 3 years ago
- Hardware Hacking Cheatsheet infograph☆153Updated last year
- Filter URLs to save your time.☆60Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆69Updated 2 weeks ago
- Hi everyone,☆59Updated last year
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆19Updated 6 months ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 weeks ago
- Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware☆31Updated 3 weeks ago
- ☆34Updated 2 years ago
- bevigil-cli provides a unified command line interface and python library for using BeVigil OSINT API.☆122Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- ☆135Updated 2 years ago
- ☆48Updated 4 years ago
- ☆43Updated 2 months ago
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- Penetration Testing Interview Questions☆40Updated 3 years ago