Hardware/IOT Pentesting Wiki
☆870Nov 9, 2025Updated 5 months ago
Alternatives and similar repositories for HardwareAllTheThings
Users that are interested in HardwareAllTheThings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory and Internal Pentest Cheatsheets☆2,171Apr 13, 2026Updated 2 weeks ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Dec 23, 2020Updated 5 years ago
- Simple script for the WHID injector - a rubberducky wifi☆119Jul 16, 2024Updated last year
- Source of swisskyrepo.github.io - Public☆30Jul 12, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Retrieve LAPS password from LDAP☆442Feb 17, 2021Updated 5 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,653Mar 11, 2024Updated 2 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,533Sep 4, 2025Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex☆422Feb 27, 2025Updated last year
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆471Sep 22, 2019Updated 6 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,234Updated this week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,498Apr 12, 2026Updated 2 weeks ago
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,140Oct 21, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,504Feb 15, 2026Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,717Nov 29, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,277Apr 23, 2026Updated last week
- A curated list of awesome embedded and IoT security resources.☆2,303Oct 17, 2023Updated 2 years ago
- Fully featured and community-driven hacking environment☆2,982Apr 9, 2026Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- The Network Execution Tool☆5,469Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Teaming Tactics and Techniques☆4,575Aug 22, 2024Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆8,682Apr 18, 2026Updated last week
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆204Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆13,131Apr 20, 2026Updated last week
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆188Jun 22, 2022Updated 3 years ago
- Real-world infosec wordlists, updated regularly☆1,742Updated this week
- game of active directory☆7,753Mar 12, 2026Updated last month
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆185Feb 12, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,596Jan 18, 2026Updated 3 months ago
- Rust Weaponization for Red Team Engagements.☆3,003Apr 25, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,236Mar 28, 2025Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,671Updated this week
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,379Mar 9, 2026Updated last month
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,584Mar 11, 2026Updated last month