{"id":27180577,"url":"https://github.com/yogsec/hardware-hacking-tools","last_synced_at":"2026-01-20T23:02:27.019Z","repository":{"id":283283742,"uuid":"951261655","full_name":"yogsec/Hardware-Hacking-Tools","owner":"yogsec","description":"Lists various tools used in hardware hacking. ","archived":false,"fork":false,"pushed_at":"2025-03-31T20:03:59.000Z","size":94,"stargazers_count":25,"open_issues_count":0,"forks_count":4,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-04-09T14:36:57.644Z","etag":null,"topics":["bug-bounty","bug-bounty-tools","cyber-security","cybersecurity","hacker","hackers","hacking-tool","hacking-tools","hardware-hacker","hardware-hackers","hardware-hacking","hardware-hacking-tools","hardware-pentesting","hardware-security","osint","pentesting","pentesting-tools","physical-security","security","security-tools"],"latest_commit_sha":null,"homepage":"https://linktr.ee/yogsec","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/yogsec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-03-19T12:07:10.000Z","updated_at":"2025-04-05T03:42:28.000Z","dependencies_parsed_at":"2025-03-20T01:33:21.703Z","dependency_job_id":null,"html_url":"https://github.com/yogsec/Hardware-Hacking-Tools","commit_stats":null,"previous_names":["yogsec/hardware-hacking-tools"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/yogsec/Hardware-Hacking-Tools","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FHardware-Hacking-Tools","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FHardware-Hacking-Tools/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FHardware-Hacking-Tools/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FHardware-Hacking-Tools/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/yogsec","download_url":"https://codeload.github.com/yogsec/Hardware-Hacking-Tools/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FHardware-Hacking-Tools/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28618332,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-20T22:24:05.405Z","status":"ssl_error","status_checked_at":"2026-01-20T22:20:31.342Z","response_time":117,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bug-bounty","bug-bounty-tools","cyber-security","cybersecurity","hacker","hackers","hacking-tool","hacking-tools","hardware-hacker","hardware-hackers","hardware-hacking","hardware-hacking-tools","hardware-pentesting","hardware-security","osint","pentesting","pentesting-tools","physical-security","security","security-tools"],"created_at":"2025-04-09T14:37:07.447Z","updated_at":"2026-01-20T23:02:26.978Z","avatar_url":"https://github.com/yogsec.png","language":null,"readme":"# 🔧 Hardware Hacking Tools\n\n![Hardware Hacking Tools](https://media1.giphy.com/media/v1.Y2lkPTc5MGI3NjExcXB2M3l1cHFmdXpyaXJldXplOWwwb3E1OXJoMG90ZDFiY2dyeXptMiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/z9g6xLr5C0H1m/giphy.gif)\n\n**Hardware Hacking Tools**! 🚀 lists various tools used in hardware hacking, categorized by attack methods. Whether you're a security researcher, penetration tester, or just curious about hardware security, this repo is for you! 🔍💻\n\n\u003cdiv align=\"center\"\u003e\n      \u003ca href=\"https://www.whatsapp.com/channel/0029Vb68FeRFnSzGNOZC3h3x\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=WhatsApp+Channel\u0026amp;color=25D366\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"WhatsApp Channel\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://t.me/HackerSecure\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=Telegram+Channel\u0026amp;color=24A1DE\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"Telegram Channel\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://www.linkedin.com/in/cybersecurity-pentester/\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=LinkedIn\u0026amp;color=0A66C2\u0026amp;logo=LinkedIn\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"LinkedIn\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://linktr.ee/yogsec\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=LinkTree\u0026amp;color=25D366\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"WhatsApp Channel\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://x.com/home\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=X\u0026amp;color=000000\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"Lichess\"\u003e\u003c/a\u003e\n  \u003ca href=\"mailto:abhinavsingwal@gmail.com?subject=Hi%20YogSec%20,%20nice%20to%20meet%20you!\"\u003e\u003cimg alt=\"Email\" src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=Gmail\u0026amp;color=EA4335\u0026amp;logo=Gmail\u0026amp;logoColor=FFFFFF\u0026amp;label=\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://yogsec.github.io/yogsec/\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=Website\u0026amp;color=FFFFC5\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"Telegram Channel\"\u003e\u003c/a\u003e  \n  \n\u003c/div\u003e\n\n---\n\n# Firmware Analysis \u0026 Extraction 🖥️\n\n#### 🛠️ JTAG/SWD Debugging\n- **[JTAGulator](http://www.grandideastudio.com/jtagulator/)** – Identifies JTAG pinouts on embedded devices.\n- **[OpenOCD](http://openocd.org/)** – Open-source debugging and programming tool for embedded devices.\n- **[UrJTAG](http://urjtag.org/)** – Universal JTAG library supporting multiple devices.\n- **[Segger J-Link](https://www.segger.com/products/debug-probes/j-link/)** – A commercial JTAG/SWD debugger with high-speed debugging.\n- **[Xilinx Platform Cable USB II](https://www.xilinx.com/products/boards-and-kits/hw-usb-ii-g.html)** – Used for debugging and programming Xilinx devices.\n- **[STM32 ST-Link](https://www.st.com/en/development-tools/st-link-v2.html)** – Debugging and flashing STM32 microcontrollers.\n- **[Black Magic Probe](https://github.com/blacksphere/blackmagic)** – Open-source JTAG debugger supporting SWD.\n\n#### 🔌 UART/SPI/I2C Debugging\n- **[Bus Pirate](http://dangerousprototypes.com/docs/Bus_Pirate)** – Universal interface for SPI, I2C, and UART debugging.\n- **[Logic Analyzers](https://www.saleae.com/)** – Capture and analyze signals (Saleae, Sigrok, etc.).\n- **[FTDI Adapters](https://www.ftdichip.com/)** – Convert USB to UART/SPI/I2C for debugging.\n- **[Beagle I2C/SPI Protocol Analyzer](https://www.totalphase.com/products/beagle-i2cspi/)** – Monitors I2C and SPI traffic.\n- **[TI MSP-FET](https://www.ti.com/tool/MSP-FET)** – Debugger for MSP430 microcontrollers.\n\n#### 📥 Firmware Dumping\n- **[CH341A Programmer](https://www.aliexpress.com/wholesale?SearchText=CH341A+Programmer)** – Reads and writes SPI flash chips.\n- **[Flashrom](https://flashrom.org/Flashrom)** – Open-source tool for reading, writing, and erasing firmware.\n- **[Dediprog SF100](https://www.dediprog.com/products/SF100)** – High-speed SPI Flash programmer.\n- **[Shikra](https://int3.cc/products/the-shikra)** – Debug and communicate with UART, JTAG, and SPI devices.\n- **[RT809H](https://www.aliexpress.com/wholesale?SearchText=RT809H)** – Universal programmer for dumping firmware from EEPROMs.\n- **[Teensy](https://www.pjrc.com/teensy/)** – Custom DIY method for SPI flash dumping.\n\n#### 📂 Reverse Engineering Firmware\n- **[Ghidra](https://ghidra-sre.org/)** – NSA’s open-source reverse engineering framework.\n- **[IDA Pro](https://hex-rays.com/ida-pro/)** – Industry-standard tool for disassembling firmware binaries.\n- **[Binwalk](https://github.com/ReFirmLabs/binwalk)** – Extracts and analyzes firmware images.\n- **[Firmware-Mod-Kit](https://github.com/rampageX/firmware-mod-kit)** – Extracts and modifies firmware.\n- **[Unblob](https://github.com/onekey-sec/unblob)** – Extracts and analyzes binary blobs.\n- **[GDB (GNU Debugger)](https://www.sourceware.org/gdb/)** – Debugging firmware in real-time.\n- **[Radare2](https://rada.re/n/)** – Open-source framework for binary analysis.\n- **[Capstone](http://www.capstone-engine.org/)** – Disassembly framework for analyzing instruction sets.\n- **[Angr](https://angr.io/)** – Python-based binary analysis tool.\n- **[Cutter](https://cutter.re/)** – GUI-based alternative to Radare2 for reverse engineering.\n\n---\n\n# 🔨 Physical Attacks Toolkit\n\n## 🛠️ Side-Channel Attacks \u0026 Fault Injection\n- [**ChipWhisperer**](https://newae.com/) – Open-source side-channel analysis and fault injection tool.\n- [**ChipSHOUTER**](https://newae.com/chipshouter/) – Advanced electromagnetic fault injection (EMFI) tool.\n- [**GlitchKit**](https://github.com/hexanaut/glitchkit) – Tool for voltage glitching on embedded devices.\n- [**Raspberry Pi Pico + PicoEMP**](https://github.com/33Y0KHz/PicoEMP) – DIY EM fault injection tool.\n- [**OpenQASM**](https://github.com/Qiskit/openqasm) – Side-channel vulnerability analysis tool for quantum computing.\n- [**Riscure Inspector**](https://www.riscure.com/) – Commercial side-channel analysis tool.\n\n## 🔥 Voltage \u0026 Clock Glitching\n- [**GlitchKit**](https://github.com/hexanaut/glitchkit) – Software/hardware glitching toolkit.\n- [**ChipWhisperer-Lite**](https://newae.com/) – Hardware fault injection tool for glitching.\n- [**Proxmark3**](https://proxmark.com/) – RFID/NFC analysis and glitching attacks.\n- [**HackRF One**](https://greatscottgadgets.com/hackrf/) – SDR for RF glitching.\n\n## 🔩 Hardware Debugging \u0026 Tampering\n- [**JTAGulator**](http://www.grandideastudio.com/jtagulator/) – Finds JTAG pinouts for debugging.\n- [**Shikra**](https://int3.cc/products/the-shikra) – Works with JTAG, UART, and SPI.\n- [**Bus Pirate**](http://dangerousprototypes.com/docs/Bus_Pirate) – Multi-protocol debugging interface.\n- [**GoodFET**](https://github.com/travisgoodspeed/goodfet) – Open-source JTAG debugging tool.\n- [**OpenOCD**](http://openocd.org/) – Open-source JTAG/SWD debugging tool.\n- [**Black Magic Probe**](https://github.com/blacksphere/blackmagic) – Open-source debugging tool.\n\n## 🏴‍☠️ Chip Decapping \u0026 Microprobing\n- [**Chemical Decapping Kits**](https://www.micross.com/products/services/die-processing/decapsulation.aspx) – Removes IC protective layers.\n- [**FIB (Focused Ion Beam) Tools**](https://www.zeiss.com/microscopy/en/products/fib-sem.html) – Modifies IC internals.\n- [**Probe Stations**](https://www.signatone.com/) – Allows direct electrical contact with microchips.\n\n## 📡 RFID/NFC Cloning \u0026 Attacks\n- [**Proxmark3**](https://proxmark.com/) – RFID/NFC cloning and hacking device.\n- [**ChameleonMini**](https://github.com/emsec/ChameleonMini) – Open-source NFC emulation tool.\n- [**Flipper Zero**](https://flipperzero.one/) – Multi-tool for RFID, NFC, and other hardware hacking.\n- [**MFCUK**](https://github.com/nfc-tools/mfcuk) – Cracks Mifare Classic RFID cards.\n- [**MFOC**](https://github.com/nfc-tools/mfoc) – Dumps and cracks Mifare Classic keys.\n\n## 🧲 Electromagnetic Attacks \u0026 TEMPEST\n- [**TempestSDR**](https://github.com/martinmarinov/TempestSDR) – Reads screen emissions via radio signals.\n- [**Van Eck Phreaking Kits**](https://github.com/van-eck-phreaking) – Exploits electromagnetic leaks.\n- [**USBKill**](https://github.com/hephaest0s/usbkill) – Physically destroys hardware via high-voltage USB.\n\n---\n\n# Wireless \u0026 Radio Hacking Tools\n\n## 📡 Wi-Fi Hacking Tools\n- **[Aircrack-ng](https://www.aircrack-ng.org/)** – Suite for Wi-Fi penetration testing.\n- **[Wifite](https://github.com/derv82/wifite2)** – Automated Wi-Fi cracking tool.\n- **[Fern Wi-Fi Cracker](https://github.com/savio-code/fern-wifi-cracker)** – GUI tool for Wi-Fi auditing.\n- **[Reaver](https://github.com/t6x/reaver-wps-fork-t6x)** – WPS attack tool.\n- **[PixieWPS](https://github.com/wiire-a/pixiewps)** – Offline WPS attack tool.\n- **[Bettercap](https://www.bettercap.org/)** – Powerful network attack tool, including Wi-Fi attacks.\n- **[MDK3](https://github.com/wi-fi-analyzer/mdk3-master)** – Wi-Fi testing and deauthentication tool.\n- **[Kismet](https://www.kismetwireless.net/)** – Wireless network detection and monitoring.\n- **[Wigle.net](https://wigle.net/)** – Database for mapping Wi-Fi networks.\n\n## 📶 Bluetooth \u0026 BLE Hacking\n- **[Blue Hydra](https://github.com/pwnieexpress/blue_hydra)** – Bluetooth device scanner.\n- **[Bluesniff](https://github.com/andrewmichaelsmith/bluesniff)** – Bluetooth packet sniffer.\n- **[BtleJack](https://github.com/virtualabs/btlejack)** – Bluetooth Low Energy hijacking tool.\n- **[BLE CTF](https://github.com/hackgnar/ble_ctf)** – Bluetooth attack training tool.\n- **[Bleah](https://github.com/evilsocket/bleah)** – Bluetooth hacking framework.\n- **[BlueRanger](https://github.com/OJ/BlueRanger)** – Detect Bluetooth device distances.\n- **[Ubertooth One](https://greatscottgadgets.com/ubertoothone/)** – Open-source Bluetooth monitoring tool.\n\n## 📻 Software-Defined Radio (SDR) Hacking\n- **[GNU Radio](https://www.gnuradio.org/)** – Signal processing toolkit for SDR.\n- **[HackRF One](https://greatscottgadgets.com/hackrf/)** – Software-defined radio device for hacking.\n- **[RTL-SDR](https://www.rtl-sdr.com/)** – Cheap USB SDR receiver.\n- **[SDR# (SDRSharp)](https://airspy.com/download/)** – Popular SDR software.\n- **[GQRX](http://gqrx.dk/)** – Open-source SDR software.\n- **[BladeRF](https://nuand.com/)** – USB 3.0 SDR device for signal analysis.\n- **[Red Pitaya](https://www.redpitaya.com/)** – SDR and signal processing platform.\n- **[OsmoSDR](https://osmocom.org/projects/sdr/wiki/OsmoSDR)** – Open-source SDR framework.\n- **[RFExplorer](https://rfexplorer.com/)** – Portable RF spectrum analyzer.\n- **[GR-GSM](https://github.com/ptrkrysik/gr-gsm)** – GSM signal analysis tool.\n\n## 📡 RFID/NFC Hacking\n- **[Proxmark3](https://proxmark.com/)** – RFID/NFC research tool.\n- **[ChameleonMini](https://kasper-oswald.de/chameleonmini/)** – RFID emulator and cloning device.\n- **[Flipper Zero](https://flipperzero.one/)** – Multi-tool for wireless attacks, RFID cloning, and more.\n- **[MFCUK](https://github.com/nfc-tools/mfcuk)** – Tool for MIFARE Classic card attacks.\n- **[MFOC](https://github.com/nfc-tools/mfoc)** – MIFARE Classic offline cracking tool.\n- **[NFC Tools](https://www.wakdev.com/en/apps/nfc-tools.html)** – Mobile app for NFC analysis.\n- **[RFIDler](https://rfidler.com/)** – Software-defined RFID tool.\n- **[Libnfc](https://github.com/nfc-tools/libnfc)** – Library for NFC communication.\n- **[ICopy-X](https://icopyx.com/)** – RFID cloning and hacking device.\n\n## 📞 GSM \u0026 Mobile Network Hacking\n- **[OsmocomBB](https://osmocom.org/projects/baseband/wiki)** – Open-source GSM baseband software.\n- **[OpenBTS](https://github.com/RangeNetworks/openbts)** – Build your own GSM network.\n- **[IMSI Catcher](https://github.com/Oros42/IMSI-catcher)** – Detect IMSI catchers and rogue cell towers.\n- **[Stingray Detector](https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector)** – Mobile IMSI catcher detection.\n- **[SIMtrace](https://osmocom.org/projects/simtrace/wiki)** – Intercept SIM card communication.\n\n---\n\n# 🔬 Chip-Level Attack Tools\n\n### 🏴‍☠️ 1. Chip Decapping \u0026 Microscopy\n- **[Razor Blade \u0026 Nitric Acid](https://en.wikipedia.org/wiki/Die_destruction)** – Basic method for removing chip packaging.\n- **[FIB (Focused Ion Beam)](https://en.wikipedia.org/wiki/Focused_ion_beam)** – High-end method for modifying IC structures.\n- **[Delayering Kits](https://www.microscopy-and-analysis.com/)** – Chemical solutions for peeling off IC layers.\n- **[Optical Microscopes](https://www.edmundoptics.com/)** – Inspecting chips post-decapping.\n- **[Scanning Electron Microscope (SEM)](https://www.thermofisher.com/)** – Advanced chip imaging.\n\n### ⚡ 2. Fault Injection \u0026 Glitching\n- **[ChipWhisperer](https://chipwhisperer.io/)** – Side-channel analysis and fault injection tool.\n- **[ChipSHOUTER](https://www.newae.com/chipshouter/)** – Electromagnetic fault injection (EMFI).\n- **[GlitchKit](https://github.com/gmbnomis/GlitchKit)** – Glitching framework for embedded systems.\n- **[VoltageGlitcher](https://github.com/astarasikov/VoltageGlitcher)** – Fault injection via voltage control.\n- **[SPIDriver](https://github.com/robotic-controls/spidriver)** – SPI communication and glitching.\n\n### 🔑 3. Power Analysis \u0026 Side-Channel Attacks\n- **[ChipWhisperer-Nano](https://wiki.newae.com/ChipWhisperer-Nano)** – Low-cost power analysis tool.\n- **[Riscure Inspector](https://www.riscure.com/security-tools/inspector-sca/)** – Commercial side-channel attack framework.\n- **[OpenADC](https://www.newae.com/chipwhisperer/)** – ADC-based power analysis module.\n- **[EM Probe](https://www.langer-emv.de/en/emc-probes/)** – Captures electromagnetic signals from chips.\n- **[Kocher’s DPA Toolkit](https://www.cryptography.com/publications/dpa.html)** – Differential Power Analysis (DPA) framework.\n\n### 🛡 4. Secure Chip Extraction \u0026 Key Recovery\n- **[Glitching AES Chips](https://github.com/sidechannel-aes-glitching)** – Bypassing AES protection via fault injection.\n- **[Voltage EMIF Fault Injection](https://www.emfi.eu/)** – Extracting keys via voltage spikes.\n- **[X-Ray Chip Inspection](https://www.hitachi-hightech.com/)** – Identifying hidden security fuses.\n- **[Laser Fault Injection](https://www.riscure.com/)** – Disrupting chip execution to leak data.\n\n### 📥 5. Firmware \u0026 ROM Dumping\n- **[JTAGulator](http://www.grandideastudio.com/jtagulator/)** – Identifying JTAG pinouts on unknown chips.\n- **[Flashrom](https://flashrom.org/)** – Dumping flash memory from ICs.\n- **[Bus Pirate](http://dangerousprototypes.com/docs/Bus_Pirate)** – Dumping firmware from SPI/I2C/UART chips.\n- **[Dediprog SF100](https://www.dediprog.com/products/SF100)** – High-speed SPI Flash programmer.\n- **[EEPROM Dumper](https://github.com/devttys0/firmware-analysis-toolkit)** – Extracting EEPROM contents.\n\n---\n\n# 🔌 USB \u0026 Peripheral Attack Tools\n\n### 🏴‍☠️ 1. USB Exploitation \u0026 HID Attacks\n- **[Rubber Ducky](https://shop.hak5.org/)** – HID-based keystroke injection tool.\n- **[Bash Bunny](https://shop.hak5.org/)** – Advanced automation \u0026 attack payloads.\n- **[OMG Cable](https://o.mg.lol/)** – Malicious USB cable for remote access.\n- **[Evil Crow Cable](https://github.com/EvilCROW-Cables)** – Open-source keystroke injection.\n- **[Cactus WHID](https://github.com/whid-injector/WHID)** – USB HID injection with WiFi.\n- **[PHUKD/URFUKED](https://samy.pl/urfu/)** – HID-based payload execution.\n\n### 💾 2. USB Data Extraction \u0026 Exfiltration\n- **[USBHarpoon](https://github.com/0xdea/USBharpoon)** – Data exfiltration via USB.\n- **[USaBUSe](https://github.com/jkcvb/USaBUSe)** – Automated USB data theft.\n- **[USBExfil](https://github.com/usbexfil/usbexfil)** – Auto-copy data from plugged-in devices.\n\n### 🎭 3. USB Impersonation \u0026 Spoofing\n- **[P4wnP1 A.L.O.A.](https://github.com/RoganDawes/P4wnP1_aloa)** – USB attack framework (HID, WiFi, storage).\n- **[USBProxy](https://github.com/dominicgs/USBProxy)** – Man-in-the-Middle (MitM) for USB devices.\n- **[USBDriveBy](https://samy.pl/usbdriveby/)** – USB device emulation for bypassing security.\n- **[BadUSB](https://github.com/LaBlueFrog/badusb)** – Create malicious USB payloads.\n\n### 📡 4. USB Network Attacks\n- **[LAN Turtle](https://shop.hak5.org/)** – USB network implant for remote access.\n- **[Packet Squirrel](https://shop.hak5.org/)** – USB network sniffing and payload execution.\n- **[WiFi Pineapple](https://shop.hak5.org/)** – Rogue WiFi access point for network MITM.\n\n### 🔥 5. USB Firmware \u0026 Debugging Exploits\n- **[USBKill](https://github.com/hephaest0s/usbkill)** – Automatically disable a system when a USB device is removed.\n- **[USBlyzer](https://www.usblyzer.com/)** – USB protocol analyzer for debugging.\n- **[USBGuard](https://github.com/dkopecek/usbguard)** – Policy-based USB protection.\n- **[FaceDancer](https://github.com/usb-tools/Facedancer)** – USB attack framework for fuzzing \u0026 reversing.\n- **[GreatFET One](https://greatscottgadgets.com/greatfet/)** – USB debugging and analysis tool.\n\n---\n\n# 🛠 Hardware Modification \u0026 Implantation\n\n### 🏴‍☠️ 1. Hardware Backdoor Implants\n- **[NSA COTTONMOUTH](https://en.wikipedia.org/wiki/ANT_catalog)** – USB implant for covert data exfiltration.\n- **[NSA IRONCHEF](https://www.schneier.com/blog/archives/2013/12/the_nsas_ironch.html)** – Malicious BIOS/firmware modification for persistence.\n- **[NSA DEITYBOUNCE](https://en.wikipedia.org/wiki/ANT_catalog)** – BIOS-level malware for remote access.\n- **[BadUSB](https://github.com/samyk/usbdriveby)** – USB firmware modification for keystroke injection.\n- **[USBNinja](https://usb-ninja.com/)** – Wireless USB payload injector for remote attacks.\n- **[OMG Cable](https://shop.hak5.org/products/omg-cable)** – Malicious USB cable for payload execution.\n\n### 🎛 2. BIOS \u0026 Firmware Modification\n- **[Flashrom](https://flashrom.org/)** – Reads, writes, erases, and verifies BIOS firmware.\n- **[UEFI Tool](https://github.com/LongSoft/UEFITool)** – Analyzes and modifies UEFI firmware.\n- **[CH341A Programmer](https://www.aliexpress.com/item/32820954869.html)** – USB flash programmer for BIOS modifications.\n- **[Bus Pirate](http://dangerousprototypes.com/docs/Bus_Pirate)** – SPI/I2C interface for firmware modifications.\n- **[Dediprog SF100](https://www.dediprog.com/products/SF100)** – SPI flash programmer for BIOS recovery.\n- **[Intel ME Cleaner](https://github.com/corna/me_cleaner)** – Disables Intel Management Engine.\n\n### 🔌 3. Hardware Keyloggers \u0026 Data Interceptors\n- **[KeyGrabber](https://www.keelog.com/)** – Hardware keylogger that records keystrokes invisibly.\n- **[WiFi Keylogger](https://www.keelog.com/wifi-keylogger/)** – Wirelessly transmits keystroke logs over WiFi.\n- **[USB Keylogger](https://www.keelog.com/usb-keylogger/)** – Plug-and-play keylogger for USB keyboards.\n- **[LAN Tap](https://greatscottgadgets.com/throwingstar/)** – Passive network traffic sniffer.\n- **[PS/2 Hardware Keylogger](https://www.keelog.com/ps2-keylogger/)** – Keystroke logger for older PS/2 keyboards.\n\n### 🔩 4. Covert Implants \u0026 Surveillance Devices\n- **[PwnPlug](https://www.pwnieexpress.com/)** – Covert network implant disguised as a power adapter.\n- **[Pwnagotchi](https://pwnagotchi.ai/)** – AI-driven WiFi hacking device.\n- **[HackRF One](https://greatscottgadgets.com/hackrf/)** – Wireless SDR for sniffing and modifying radio signals.\n- **[Flipper Zero](https://flipperzero.one/)** – Multi-functional hacking device for RFID/NFC access.\n- **[NSA RAGEMASTER](https://wikileaks.org/spyfiles/document/National-Security-Agency-NSA-RAGEMASTER-Monitor-Tapping-Hardware-Im-Plant-Description/)** – Covert RF implant that transmits monitor data remotely.\n- **[WiFi Pineapple](https://shop.hak5.org/products/wifi-pineapple)** – Wireless network penetration testing device.\n\n### ⚡ 5. Peripheral Device Hijacking\n- **[USB Rubber Ducky](https://shop.hak5.org/products/usb-rubber-ducky)** – Keystroke injection tool disguised as a USB drive.\n- **[MalDuino](https://malduino.com/)** – Open-source BadUSB keystroke injection tool.\n- **[ESPloitV2](https://github.com/exploitagency/ESPLoiter)** – ESP8266-based WiFi HID attack device.\n- **[MouseJack](https://github.com/BastilleResearch/mousejack)** – Exploits vulnerabilities in wireless mice.\n- **[AirDrive Forensic Keylogger](https://www.keelog.com/airdrive-keylogger/)** – Wireless keylogger with real-time keystroke transmission.\n\n### 🔬 6. Chip-Level Hardware Trojans\n- **[ChipWhisperer](https://chipwhisperer.io/)** – Power analysis and fault injection tool.\n- **[ChipSHOUTER](https://www.newae.com/chipshouter/)** – Electromagnetic fault injection for security bypassing.\n- **[JTAGulator](http://www.grandideastudio.com/jtagulator/)** – Identifies JTAG interfaces on unknown chips.\n- **[GlitchKit](https://github.com/gmbnomis/GlitchKit)** – Firmware glitching and fault injection framework.\n- **[X-Ray Chip Inspection](https://www.hitachi-hightech.com/)** – Scans chips for hidden implants and modifications.\n\n---\n\n# ⚡ Power \u0026 Battery Attack Tools\n\n### 🔋 1. Power Analysis \u0026 Side-Channel Attacks\n- **[ChipWhisperer](https://chipwhisperer.io/)** – Side-channel power analysis and fault injection.\n- **[Riscure Inspector](https://www.riscure.com/security-tools/inspector-sca/)** – Commercial tool for Differential Power Analysis (DPA).\n- **[OpenADC](https://www.newae.com/chipwhisperer/)** – Analog-to-digital converter for power monitoring.\n- **[Kocher’s DPA Toolkit](https://www.cryptography.com/publications/dpa.html)** – Used for differential power analysis.\n- **[Langer EM Probe](https://www.langer-emv.de/en/emc-probes/)** – Captures electromagnetic emissions from chips.\n\n### ⚡ 2. Voltage Fault Injection \u0026 Glitching\n- **[ChipSHOUTER](https://www.newae.com/chipshouter/)** – Electromagnetic fault injection (EMFI).\n- **[VoltageGlitcher](https://github.com/astarasikov/VoltageGlitcher)** – Injects voltage glitches to bypass security.\n- **[GlitchKit](https://github.com/gmbnomis/GlitchKit)** – Framework for hardware glitching.\n- **[SPIDriver](https://github.com/robotic-controls/spidriver)** – SPI-based power glitching tool.\n- **[EMFI Kit](https://www.riscure.com/)** – Voltage and electromagnetic fault injection toolkit.\n\n### 🔌 3. Power Consumption \u0026 Tampering Attacks\n- **[USBKill](https://github.com/hephaest0s/usbkill)** – Kills power to devices via USB ports.\n- **[Proxmark3](https://github.com/Proxmark/proxmark3/)** – RFID power analysis tool.\n- **[Flipper Zero](https://flipperzero.one/)** – Multi-functional device for power manipulation.\n- **[Lab Power Supplies](https://www.keysight.com/)** – Precision voltage control for attacks.\n- **[Raspberry Pi Pico](https://www.raspberrypi.com/products/raspberry-pi-pico/)** – Can be used for power analysis and manipulation.\n\n### 🔥 4. Battery-Based Attacks\n- **[Supercapacitor Surge](https://www.supercaptech.com/)** – Disrupts devices with sudden power bursts.\n- **[Battery Spoofing](https://www.pentestpartners.com/security-blog/battery-attacks/)** – Modifies power reports to bypass security.\n- **[DC Power Attack](https://www.analog.com/en/technical-articles/dc-power-analysis.html)** – Manipulates voltage to damage components.\n- **[Inductive Coupling](https://www.researchgate.net/publication/Inductive-Power-Analysis)** – Extracts data through power fluctuations.\n- **[Battery Overload](https://www.teardown.com/)** – Overcharges or overheats batteries for attack vectors.\n\n---\n\n# 🏴‍☠️ Supply Chain Attack Tools\n\n### 🔩 1. Hardware Supply Chain Attacks\n- **[NSA Cottonmouth](https://en.wikipedia.org/wiki/Cottonmouth_(exploit))** – Covert USB implant with espionage capabilities.\n- **[NSA IRATEMONK](https://en.wikipedia.org/wiki/Equation_Group)** – Hard drive firmware injection.\n- **[NSA JETPLOW](https://www.schneier.com/blog/archives/2014/03/more_nsa_attacks.html)** – Persistent backdoors in Cisco devices.\n- **[NSA SURLYSPAWN](https://electrospaces.blogspot.com/2015/03/nsas-catalog-of-tools-for-hardware.html)** – Secure chip manipulation.\n- **[NSA FEEDTHROUGH](https://electrospaces.blogspot.com/2015/03/nsas-catalog-of-tools-for-hardware.html)** – BIOS-level malware persistence.\n\n### 🔗 2. Firmware \u0026 BIOS Manipulation\n- **[UEFI Implant](https://github.com/chipsec/chipsec)** – UEFI firmware analysis and modification.\n- **[Thunderstrike](https://trmm.net/Thunderstrike/)** – Exploiting MacBook boot ROM.\n- **[BIOS Implant Tools](https://github.com/Cr4sh/BIOS_Intelligence)** – BIOS dumping and modification.\n- **[Coreboot](https://www.coreboot.org/)** – Open-source firmware alternative.\n- **[Heads](https://github.com/osresearch/heads)** – Secure boot with tamper detection.\n\n### 🎭 3. Software Supply Chain Attacks\n- **[Poisoned Dependencies](https://github.com/coinbase/supply-chain-security)** – Detecting malicious npm/PyPI packages.\n- **[Typosquatting Malware](https://typosquatting-tester.readthedocs.io/en/latest/)** – Identifying typo-based dependency attacks.\n- **[Dependency Confusion Attack](https://github.com/visma-prodsec/confused)** – Checking for dependency confusion vulnerabilities.\n- **[BadUSB Firmware](https://github.com/hak5darren/USB-Rubber-Ducky)** – Exploiting firmware on USB devices.\n- **[Firmware Patching](https://github.com/ReFirmLabs/binwalk)** – Extract and modify firmware images.\n\n### 🏗 4. Hardware Implantation\n- **[Rogue Raspberry Pi](https://github.com/xychelsea/Raspberry-Pi-Payloads)** – Concealed MITM attack device.\n- **[Malicious USB Keylogger](https://github.com/hak5darren/USB-Rubber-Ducky)** – USB-based keystroke logging.\n- **[Trojanned ICs](https://www.mitre.org/publications/technical-papers/trust-in-integrated-circuits)** – Compromised microchips.\n- **[Intercepted Shipment Attacks](https://www.schneier.com/blog/archives/2013/12/how_the_nsa_tam.html)** – Tampering with hardware in transit.\n\n### 🛡 5. Detection \u0026 Prevention\n- **[SigMF](https://github.com/gnuradio/sigmf-ninja)** – Spectrum analysis to detect implants.\n- **[Osquery](https://osquery.io/)** – Querying firmware for anomalies.\n- **[YARA Rules](https://github.com/VirusTotal/yara)** – Malware detection in software supply chains.\n- **[Binwalk](https://github.com/ReFirmLabs/binwalk)** – Firmware backdoor analysis.\n- **[Firmware Integrity Checker](https://github.com/chipsec/chipsec)** – Comparing firmware to clean versions.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyogsec%2Fhardware-hacking-tools","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fyogsec%2Fhardware-hacking-tools","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyogsec%2Fhardware-hacking-tools/lists"}