PentestHardware
Vulnerability assessment
A collection of notes on hardware vulnerability assessment and exploitation
Kinda useful notes collated together publicly
492 stars
69 watching
81 forks
last commit: over 5 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
adon90/pentest_compilation | A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,324 |
timip/oswe | A collection of tools and guides to exploit vulnerabilities in various web applications | 567 |
freefv/tencent_yun_tools | A collection of Python scripts to exploit vulnerabilities in Tencent Cloud services using an AccessKey | 34 |
corkami/pocs | Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,475 |
vulnreproduction/linuxflaw | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
jiep/offensive-ai-compilation | A curated collection of resources and countermeasures to protect artificial intelligence systems from attacks | 1,119 |
cure53/publications | A collection of research papers and test reports on software vulnerabilities and security issues. | 73 |
cert-polska/artemis | A modular vulnerability scanner with automatic report generation capabilities. | 560 |
hrishikesh7665/android-pentesting-checklist | A comprehensive checklist for identifying vulnerabilities in Android apps | 183 |
autistic-symposium/sec-pentesting-toolkit | A comprehensive collection of security resources and tools for pentesting and reverse engineering | 162 |
hardik05/damn_vulnerable_c_program | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 676 |
lockedbyte/cve-exploits | A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
owtf/owtf | A tool that enables efficient and targeted vulnerability testing of web applications. | 1,821 |
gmatuz/inthewilddb | A comprehensive database of vulnerability and exploitation reports | 245 |
daviddikker/endgame | An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 188 |