PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk users through key hardware security concepts, from PCB design to side-channel attacks.
☆540Dec 5, 2025Updated 4 months ago
Alternatives and similar repositories for PwnPad
Users that are interested in PwnPad are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 9 months ago
- Kerberos CNAME abuse PoC☆106Jan 27, 2026Updated 3 months ago
- binary ninja related code☆37Mar 27, 2025Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆20Jun 30, 2023Updated 2 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A testbed for RISCV vulnerable binaries that aims to produce meaningful fingerprints recognizable by a Control Flow integrity Machine Lea…☆18Mar 1, 2024Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Links from X Posts☆144Apr 22, 2026Updated last week
- Collection of exploits developed by your friendly clown☆13Oct 18, 2025Updated 6 months ago
- Extensible MacOS system telemetry generator.☆56Apr 12, 2026Updated 2 weeks ago
- ☆320Dec 14, 2025Updated 4 months ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆36Jan 11, 2026Updated 3 months ago
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- In-depth security research into VAC’s dynamic anti-cheat delivery model, focusing on loader architecture, integrity checks, and defensive…☆25Sep 1, 2025Updated 7 months ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- ☆109Feb 14, 2026Updated 2 months ago
- AI-powered assistant that integrates seamlessly with Caido☆76Feb 20, 2026Updated 2 months ago
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 4 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆94Apr 1, 2026Updated 3 weeks ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆35Oct 15, 2025Updated 6 months ago
- ☆19Oct 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Mar 6, 2023Updated 3 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated 3 months ago
- Passive network fingerprinting and analysis engine☆118Apr 23, 2026Updated last week
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆16Aug 12, 2024Updated last year
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 6 months ago
- ☆10Jul 3, 2021Updated 4 years ago
- forked from https://github.com/apsdehal/awesome-ctf.git☆45Oct 10, 2020Updated 5 years ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- drawing docker icon☆10Jun 11, 2017Updated 8 years ago
- GromHacks Labs -- The payload lists they don't want you to have. 1,324 injection probes beamed down from the mothership to detect what's …☆32Apr 12, 2026Updated 2 weeks ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆25Aug 17, 2025Updated 8 months ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 9 months ago
- ☆19Jul 9, 2022Updated 3 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated 2 months ago