souravbaghz / AwesomeHardwareHacking
Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links only.
☆47Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for AwesomeHardwareHacking
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆44Updated last year
- ☆75Updated 3 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- A curated list of awesome malware analysis tools and resources☆40Updated 2 years ago
- ☆41Updated last year
- ☆29Updated 3 years ago
- Android Pentest Setup Environment☆29Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆40Updated 3 months ago
- ☆18Updated last year
- Useful Github Dorks for BugBounty -☆61Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated last month
- Google Dorking Payloads☆10Updated 4 months ago
- Writeups on my TryHackMe adventures!☆37Updated last year
- I collected it to help the bug hunter get a reward☆55Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- ☆45Updated 6 years ago
- IoT Hacking Kit Details☆17Updated last month
- Hakin9 Security Related Magazines☆39Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated last year
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Filter URLs to save your time.☆59Updated 2 years ago
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- ☆33Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆14Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆49Updated last year
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago