Welcome Note - Antriksh Shah Spreading The Load: Building A Better Hardware Hacking Community - Kate Temkin Strategies To Harden And Neutralize UAV Using RF DEW - José Lopes Esteves The Race To Secure Texas Instruments Graphing Calculators - Brandon Wilson It WISN't Me, Attacking Industrial Wireless Mesh Networks - Erwin Paternotte And Mattijs Van Ommeren There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single And Cross User Setting - David Berend Smart Car Forensics And Sensor Warfare - Gabriel Cirlig And Stefan Tanase TLBleed: When Protecting Your CPU Caches Is Not Enough - Ben Gras And Kaveh Razavi CXO Panel - Who Needs IoT Security Certification? - People The Future Of Hardware Security Is In Open Standards - Helena Handschuh The Undercover World Of Reverse-Engineering Based Integrated Circuit Attacks - Olivier Thomas Z-Shave. Exploiting Z-Wave Downgrade Attacks - Andrew Tierney Bitfi - You Wouldn't Steal My Cloins - Andrew Tierney Fault Injection On Automotive Diagnosis Protocols - Santiago Cordoba Black Box Is Dead. Long Live Black Box! - Vladimir Kononovich And Aleksei Stennikov Product Security For IoT: Mission Impossible? - Alex Poschmann Closing Note And Prizes - Hardwear.io Crew
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
A tool for SSH server auditing with comprehensive analysis capabilities.
A collection of writeups of CTF challenges I solved, including explanations of the challenges and how I solved them.
CLI program for cybersecurity solution management with multiple functionalities and authentication methods.
A lightweight CTF platform inspired by motherfuckingwebsite.com with a focus on challenge difficulty.
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
An easy-to-use and lightweight API wrapper for Censys APIs with support for Python 3.8+.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.