PentestHardware

Vulnerability assessment

A collection of notes on hardware vulnerability assessment and exploitation

Kinda useful notes collated together publicly

GitHub

491 stars
69 watching
81 forks
last commit: over 5 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
adon90/pentest_compilation A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications 1,327
timip/oswe Preparation and exploitation research for various web applications 572
freefv/tencent_yun_tools A collection of Python scripts to exploit vulnerabilities in Tencent Cloud services using an AccessKey 34
corkami/pocs Research and experimentation with potential vulnerabilities in data hashing algorithms. 1,480
vulnreproduction/linuxflaw Records reproductions of Linux vulnerabilities in various virtual machines. 399
jiep/offensive-ai-compilation A curated collection of resources and countermeasures to protect artificial intelligence systems from attacks 1,138
cure53/publications A collection of research papers and test reports on software vulnerabilities and security issues. 73
cert-polska/artemis A modular vulnerability scanner with automatic report generation capabilities. 572
hrishikesh7665/android-pentesting-checklist A comprehensive checklist for identifying vulnerabilities in Android apps 194
autistic-symposium/sec-pentesting-toolkit A comprehensive collection of security tools and resources for pentesting and cybersecurity research 166
hardik05/damn_vulnerable_c_program An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. 681
lockedbyte/cve-exploits A collection of proof-of-concept exploits for specific software vulnerabilities 675
owtf/owtf A tool that enables efficient and targeted vulnerability testing of web applications. 1,826
gmatuz/inthewilddb A comprehensive database of vulnerability and exploitation reports 248
daviddikker/endgame An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access 189