unprovable / PentestHardware
Kinda useful notes collated together publicly
☆492Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for PentestHardware
- CTFs, solutions and presentations☆286Updated 2 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,005Updated 5 years ago
- A Bluetooth low energy capture the flag☆671Updated 3 months ago
- List of the tools and usage☆231Updated last year
- Security, hacking conferences (list)☆498Updated 2 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 4 years ago
- Notes of my OSCP study plan☆461Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆671Updated 3 years ago
- Rhme2 challenge (2016)☆305Updated 7 years ago
- PwnWiki - The notes section of the pentesters mind.☆554Updated 6 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆470Updated 4 years ago
- Post Exploitation Wiki☆513Updated 4 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆225Updated this week
- Red Team Tactics, Techniques, and Procedures☆394Updated last week
- ☆506Updated 6 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆207Updated 4 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- kernel privilege escalation enumeration and exploitation framework☆687Updated 6 years ago
- INFILTRATE 2019 Demo Materials☆340Updated last year
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆354Updated last year
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆731Updated 2 years ago
- Custom checklists, cheatsheets, links, and scripts☆126Updated 5 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- Modern tactical exploitation toolkit.☆835Updated 3 months ago