souravbaghz / AwesomeHardwareHackingLinks
Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links only.
☆54Updated 3 years ago
Alternatives and similar repositories for AwesomeHardwareHacking
Users that are interested in AwesomeHardwareHacking are comparing it to the libraries listed below
Sorting:
- ☆98Updated 4 years ago
- IoT Hacking Kit Details☆18Updated last month
- Awestome list of pentesting resources.☆120Updated last year
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆57Updated 2 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆61Updated 7 years ago
- Hardware Hacking Cheatsheet infograph☆154Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last week
- ☆29Updated 4 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- ☆138Updated 2 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- Writeups for Hack The Box machines/challenges☆27Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆84Updated 11 months ago
- ☆18Updated 4 years ago
- ☆48Updated 7 years ago
- Tools for understanding other people's code☆143Updated 2 years ago
- bevigil-cli provides a unified command line interface and python library for using BeVigil OSINT API.☆131Updated 2 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆59Updated last year
- ☆23Updated 3 years ago
- ☆14Updated 5 years ago
- ☆11Updated 5 years ago
- Penetration Testing Checklist☆36Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- ☆20Updated 3 years ago
- ☆57Updated 6 years ago
- Penetration Testing Interview Questions☆50Updated 3 years ago