Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links only.
☆56Feb 27, 2022Updated 4 years ago
Alternatives and similar repositories for AwesomeHardwareHacking
Users that are interested in AwesomeHardwareHacking are comparing it to the libraries listed below
Sorting:
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Complite Web Application Penetration Testing☆27Jul 9, 2021Updated 4 years ago
- Study and research with your docs, media, and AI in one place☆34Updated this week
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- ☆13Nov 5, 2024Updated last year
- ☆535Jul 16, 2021Updated 4 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- A repository to host the subdomain wordlists from my blog https://medium.com/@nynan/what-i-learnt-from-reading-217-subdomain-takeover-bug…☆40Nov 5, 2022Updated 3 years ago
- My home server infrastructure as code☆16Updated this week
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- QROA: A Black-Box Query-Response Optimization Attack on LLMs☆14May 23, 2025Updated 9 months ago
- This sample shows how to uninstall and hide apps programmatically☆12Dec 4, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- ☆16May 13, 2021Updated 4 years ago
- ☆53Jul 9, 2013Updated 12 years ago
- ☆19Jan 15, 2026Updated last month
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- Music downloader for Tidal☆10Apr 12, 2016Updated 9 years ago
- ☆13Mar 28, 2024Updated last year
- A series of writes about “Binary Exploitation”.☆85Jun 25, 2023Updated 2 years ago
- Kali Linux ™ build tool targeted for Hardware Hacking tools☆40Jul 19, 2024Updated last year
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- Support YASKAWA Motoman Inform language for VS Code☆12Jan 9, 2024Updated 2 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Simple Python script for generating W++ character descriptions via Poe's GPT☆10Jan 12, 2026Updated last month
- 从http://ggjd.cnstock.com/ 抓取股票的午间公告☆10Aug 1, 2016Updated 9 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- 123123☆16Dec 31, 2025Updated 2 months ago