yogsec / Hardware-Hacking-Tools
Lists various tools used in hardware hacking.
☆24Updated last week
Alternatives and similar repositories for Hardware-Hacking-Tools:
Users that are interested in Hardware-Hacking-Tools are comparing it to the libraries listed below
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆31Updated last week
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆45Updated 3 weeks ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 3 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 3 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆53Updated 2 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆21Updated 5 months ago
- ☆43Updated 3 weeks ago
- ☆27Updated 9 months ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆27Updated 5 months ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆22Updated 10 months ago
- ☆14Updated 8 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆75Updated 5 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated 3 weeks ago
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- Discovering Typo Squatting on your domains!☆67Updated 8 months ago
- ☆38Updated 3 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆42Updated 8 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Updated 3 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆19Updated 3 weeks ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 5 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆71Updated last week
- Minimalist notes for CEH-practical Cert.☆31Updated 2 years ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated 2 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆34Updated last year