therealdreg / hardware_hacking_esLinks
Hardware Hacking ES Comunidad
☆116Updated last year
Alternatives and similar repositories for hardware_hacking_es
Users that are interested in hardware_hacking_es are comparing it to the libraries listed below
Sorting:
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆48Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆58Updated 2 years ago
- wp-config-scan☆80Updated 2 years ago
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆301Updated last week
- Templates for submissions☆82Updated 2 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆122Updated 3 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Bluetooth Security Assessment Methodology☆136Updated last year
- ☆341Updated last year
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Updated 2 weeks ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆581Updated last month
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆132Updated 2 weeks ago
- ReflectUnhook - Tool designed to neutralize AV/EDR hooks.☆11Updated 10 months ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆48Updated 2 years ago
- some of the commands I usually use when doing HTB machines☆46Updated last year
- Red Team Guides☆140Updated last year
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆326Updated 3 years ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆40Updated last month
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 9 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆212Updated last year
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated last month
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆113Updated this week
- Exploits for some linux binaries :)☆37Updated last month
- These are my customization scripts written in ansible for every time I have to perform a Kali clean install.☆26Updated 5 months ago
- ☆63Updated 3 months ago
- Scripts for offensive security☆161Updated 4 months ago
- The Havoc Framework☆59Updated 3 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆30Updated 10 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago