Lists various tools used in hardware hacking.
☆34Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for Hardware-Hacking-Tools
Users that are interested in Hardware-Hacking-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated last year
- LDAP Enumeration Tool for Pentesters☆47Apr 22, 2025Updated 11 months ago
- PHP 8 and safe-build Update of the popular C99 variant of PHP Shell.☆17Feb 14, 2022Updated 4 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- Use ESP32 & MCP over MQTT to build smart devices powered by AI.☆24Aug 25, 2025Updated 7 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- ☆18Jun 24, 2023Updated 2 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆49Jul 8, 2025Updated 9 months ago
- ☆10Sep 8, 2021Updated 4 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- A toolkit for helping you reverse engineer ESP32 firmware.☆20May 8, 2023Updated 2 years ago
- Curve Fuckin Styler☆11May 22, 2025Updated 10 months ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Control a system remotely via telegram☆50Nov 13, 2024Updated last year
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Two applications for the M5Stack ATOM Echo running MicroPython.☆14Jun 2, 2020Updated 5 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 3 weeks ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆103Jan 25, 2026Updated 2 months ago
- Libraries for interfacing ESP32 with MFRC522 RFID reader.☆17Feb 14, 2022Updated 4 years ago
- My notes while studying for the PNPT from TCM Security.☆83Mar 30, 2024Updated 2 years ago
- ☆23Jul 6, 2024Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆33Aug 2, 2023Updated 2 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A compendium for Witcher FVTT.☆17Mar 14, 2026Updated last month
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆43Dec 4, 2025Updated 4 months ago
- Saleae Controller Area Network (CAN) Analyzer☆26Mar 27, 2026Updated 2 weeks ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- NanoHAT OLED for Armbian☆16May 15, 2024Updated last year