PentestHardware
Vulnerability assessment
A collection of notes on hardware vulnerability assessment and exploitation
Kinda useful notes collated together publicly
491 stars
69 watching
81 forks
last commit: over 5 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
adon90/pentest_compilation | A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,327 |
timip/oswe | Preparation and exploitation research for various web applications | 572 |
freefv/tencent_yun_tools | A collection of Python scripts to exploit vulnerabilities in Tencent Cloud services using an AccessKey | 34 |
corkami/pocs | Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |
vulnreproduction/linuxflaw | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
jiep/offensive-ai-compilation | A curated collection of resources and countermeasures to protect artificial intelligence systems from attacks | 1,138 |
cure53/publications | A collection of research papers and test reports on software vulnerabilities and security issues. | 73 |
cert-polska/artemis | A modular vulnerability scanner with automatic report generation capabilities. | 572 |
hrishikesh7665/android-pentesting-checklist | A comprehensive checklist for identifying vulnerabilities in Android apps | 194 |
autistic-symposium/sec-pentesting-toolkit | A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
hardik05/damn_vulnerable_c_program | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |
lockedbyte/cve-exploits | A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
owtf/owtf | A tool that enables efficient and targeted vulnerability testing of web applications. | 1,826 |
gmatuz/inthewilddb | A comprehensive database of vulnerability and exploitation reports | 248 |
daviddikker/endgame | An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |