PentestHardware
Vulnerability assessment
A collection of notes on hardware vulnerability assessment and exploitation
Kinda useful notes collated together publicly
491 stars
69 watching
81 forks
last commit: over 5 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,327 |
| Preparation and exploitation research for various web applications | 572 |
| A collection of Python scripts to exploit vulnerabilities in Tencent Cloud services using an AccessKey | 34 |
| Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |
| Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
| A curated collection of resources and countermeasures to protect artificial intelligence systems from attacks | 1,138 |
| A collection of research papers and test reports on software vulnerabilities and security issues. | 73 |
| A modular vulnerability scanner with automatic report generation capabilities. | 572 |
| A comprehensive checklist for identifying vulnerabilities in Android apps | 194 |
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |
| A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
| A tool that enables efficient and targeted vulnerability testing of web applications. | 1,826 |
| A comprehensive database of vulnerability and exploitation reports | 248 |
| An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |