unprovable / PentestHardware
Kinda useful notes collated together publicly
☆492Updated 5 years ago
Alternatives and similar repositories for PentestHardware:
Users that are interested in PentestHardware are comparing it to the libraries listed below
- CTFs, solutions and presentations☆285Updated 3 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 4 years ago
- A Bluetooth low energy capture the flag☆685Updated 6 months ago
- PwnWiki - The notes section of the pentesters mind.☆560Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- Security, hacking conferences (list)☆516Updated this week
- Rhme2 challenge (2016)☆313Updated 7 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- Red Team Tactics, Techniques, and Procedures☆397Updated this week
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,006Updated 6 years ago
- a tool to analyze filesystem images for security☆498Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- INFILTRATE 2019 Demo Materials☆341Updated last year
- ☆604Updated 2 years ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆681Updated 3 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 2 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- ☆182Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Awesome Firmware Security & Other Helpful Documents☆591Updated 5 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 4 years ago
- Attify OS - Distro for pentesting IoT devices☆969Updated 3 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆256Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 9 months ago