Lists various tools used in hardware hacking.
☆33Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for Hardware-Hacking-Tools
Users that are interested in Hardware-Hacking-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆38Jan 26, 2026Updated 2 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- [Under Development] Basic Scripts included☆16Mar 29, 2025Updated 11 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆67Mar 31, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 11 months ago
- A humble list of hardware hacking tools and resources curated by yours truly☆14Feb 28, 2022Updated 4 years ago
- PHP 8 and safe-build Update of the popular C99 variant of PHP Shell.☆17Feb 14, 2022Updated 4 years ago
- Opensource toolchain for TI MSP430☆14Jun 19, 2022Updated 3 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- A Chrome extension for sending push notifications to gotify/server☆12Apr 16, 2019Updated 6 years ago
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆25May 17, 2015Updated 10 years ago
- Useful OSINT tools☆40Apr 26, 2024Updated last year
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- Curve Fuckin Styler☆11May 22, 2025Updated 10 months ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Welcome to the Full Stack Realtime Chat App project, where we're building a scalable and secure real-time chat experience using the lates…☆14Dec 17, 2024Updated last year
- ☆41Dec 27, 2025Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Control a system remotely via telegram☆49Nov 13, 2024Updated last year
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Running LLMs against a sandbox airport to see if they can make the correct decisions in real time☆26Jul 22, 2025Updated 8 months ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- ☆38Jul 16, 2025Updated 8 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Updated this week
- ☆33Jul 23, 2024Updated last year
- My notes while studying for the PNPT from TCM Security.☆81Mar 30, 2024Updated last year
- Libraries for interfacing ESP32 with MFRC522 RFID reader.☆17Feb 14, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python tool to interact with WMI StdRegProv☆60Nov 19, 2024Updated last year
- Colin O'Flynn's Hacakday talk at Remoticon 2021 support repo.☆23Nov 21, 2021Updated 4 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆35Aug 2, 2023Updated 2 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- Given a user profile, a video clip and an actor(actress) profile in the video, Swap the actor's face with the user's face☆15Jul 2, 2018Updated 7 years ago