Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links only.
☆56Feb 27, 2022Updated 4 years ago
Alternatives and similar repositories for AwesomeHardwareHacking
Users that are interested in AwesomeHardwareHacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 14, 2020Updated 5 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 3 months ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 💻 A curated list of awesome websites☆10Mar 30, 2018Updated 8 years ago
- Bruce Hacking Pack is a collection of tools and scripts designed for ethical hacking, penetration testing, and cybersecurity research. It…☆22May 17, 2025Updated 10 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Kali Linux ™ build tool targeted for Hardware Hacking tools☆40Jul 19, 2024Updated last year
- USB testing framework☆14May 22, 2023Updated 2 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 2 months ago
- A cyber security toolkit blending manual testing with AI Agents☆116Apr 2, 2026Updated last week
- CC0 📝 A curated list of awesome Raspberry Pi tools, projects, images and resources. 😎 Awesome lists about all kinds of interesting topi…☆22Updated this week
- ☆31Dec 1, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- My personal list of electronics resources for DIY☆64Nov 25, 2023Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Turn any idea into a beautiful HTML visualization — with one prompt. A Claude Code skill.☆93Mar 6, 2026Updated last month
- DEPRECATED A better toolkit for building awesome websites and apps☆78Aug 28, 2015Updated 10 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Code for ATTiny85 on name badges☆17Feb 13, 2020Updated 6 years ago
- External Playbooks for Public Access☆41Jan 31, 2025Updated last year
- Volatility MindMap & Cheat Sheet☆28Feb 6, 2022Updated 4 years ago
- A tribute app in java to the one and only Elder Plinius aka Pliny☆20Feb 15, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- AuthBypass & Auto Backdooring Devices☆16Apr 12, 2019Updated 6 years ago
- Glitchy is a no-code visual interface to the world of microcontroller glitching.☆98Nov 21, 2022Updated 3 years ago
- ☆15Dec 27, 2022Updated 3 years ago
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Oct 31, 2023Updated 2 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- API to validate credit card bin☆10Jun 17, 2016Updated 9 years ago
- A Curated list of Security Resources for all connected things☆3,232Mar 7, 2026Updated last month
- Hardware Hacking Cheatsheet infograph☆158Feb 19, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆112Apr 25, 2023Updated 2 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- ☆52Jul 9, 2013Updated 12 years ago
- ☆13Apr 8, 2021Updated 5 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Hardware hacking of TL-WR841N router. Gained root shell access via the router's UART port. Extracted the file system via TFTP and extract…☆19Jun 16, 2024Updated last year
- unconventional electronic sound☆52Feb 8, 2026Updated 2 months ago