https://github.com/yogsec/hardware-hacking-tools
Lists various tools used in hardware hacking.
https://github.com/yogsec/hardware-hacking-tools
bug-bounty bug-bounty-tools cyber-security cybersecurity hacker hackers hacking-tool hacking-tools hardware-hacker hardware-hackers hardware-hacking hardware-hacking-tools hardware-pentesting hardware-security osint pentesting pentesting-tools physical-security security security-tools
Last synced: 13 days ago
JSON representation
Lists various tools used in hardware hacking.
- Host: GitHub
- URL: https://github.com/yogsec/hardware-hacking-tools
- Owner: yogsec
- License: mit
- Created: 2025-03-19T12:07:10.000Z (about 1 month ago)
- Default Branch: main
- Last Pushed: 2025-03-31T20:03:59.000Z (22 days ago)
- Last Synced: 2025-03-31T21:22:29.148Z (22 days ago)
- Topics: bug-bounty, bug-bounty-tools, cyber-security, cybersecurity, hacker, hackers, hacking-tool, hacking-tools, hardware-hacker, hardware-hackers, hardware-hacking, hardware-hacking-tools, hardware-pentesting, hardware-security, osint, pentesting, pentesting-tools, physical-security, security, security-tools
- Homepage: https://linktr.ee/yogsec
- Size: 91.8 KB
- Stars: 24
- Watchers: 1
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# π§ Hardware Hacking Tools

**Hardware Hacking Tools**! π lists various tools used in hardware hacking, categorized by attack methods. Whether you're a security researcher, penetration tester, or just curious about hardware security, this repo is for you! ππ»
---
# Firmware Analysis & Extraction π₯οΈ
#### π οΈ JTAG/SWD Debugging
- **[JTAGulator](http://www.grandideastudio.com/jtagulator/)** β Identifies JTAG pinouts on embedded devices.
- **[OpenOCD](http://openocd.org/)** β Open-source debugging and programming tool for embedded devices.
- **[UrJTAG](http://urjtag.org/)** β Universal JTAG library supporting multiple devices.
- **[Segger J-Link](https://www.segger.com/products/debug-probes/j-link/)** β A commercial JTAG/SWD debugger with high-speed debugging.
- **[Xilinx Platform Cable USB II](https://www.xilinx.com/products/boards-and-kits/hw-usb-ii-g.html)** β Used for debugging and programming Xilinx devices.
- **[STM32 ST-Link](https://www.st.com/en/development-tools/st-link-v2.html)** β Debugging and flashing STM32 microcontrollers.
- **[Black Magic Probe](https://github.com/blacksphere/blackmagic)** β Open-source JTAG debugger supporting SWD.#### π UART/SPI/I2C Debugging
- **[Bus Pirate](http://dangerousprototypes.com/docs/Bus_Pirate)** β Universal interface for SPI, I2C, and UART debugging.
- **[Logic Analyzers](https://www.saleae.com/)** β Capture and analyze signals (Saleae, Sigrok, etc.).
- **[FTDI Adapters](https://www.ftdichip.com/)** β Convert USB to UART/SPI/I2C for debugging.
- **[Beagle I2C/SPI Protocol Analyzer](https://www.totalphase.com/products/beagle-i2cspi/)** β Monitors I2C and SPI traffic.
- **[TI MSP-FET](https://www.ti.com/tool/MSP-FET)** β Debugger for MSP430 microcontrollers.#### π₯ Firmware Dumping
- **[CH341A Programmer](https://www.aliexpress.com/wholesale?SearchText=CH341A+Programmer)** β Reads and writes SPI flash chips.
- **[Flashrom](https://flashrom.org/Flashrom)** β Open-source tool for reading, writing, and erasing firmware.
- **[Dediprog SF100](https://www.dediprog.com/products/SF100)** β High-speed SPI Flash programmer.
- **[Shikra](https://int3.cc/products/the-shikra)** β Debug and communicate with UART, JTAG, and SPI devices.
- **[RT809H](https://www.aliexpress.com/wholesale?SearchText=RT809H)** β Universal programmer for dumping firmware from EEPROMs.
- **[Teensy](https://www.pjrc.com/teensy/)** β Custom DIY method for SPI flash dumping.#### π Reverse Engineering Firmware
- **[Ghidra](https://ghidra-sre.org/)** β NSAβs open-source reverse engineering framework.
- **[IDA Pro](https://hex-rays.com/ida-pro/)** β Industry-standard tool for disassembling firmware binaries.
- **[Binwalk](https://github.com/ReFirmLabs/binwalk)** β Extracts and analyzes firmware images.
- **[Firmware-Mod-Kit](https://github.com/rampageX/firmware-mod-kit)** β Extracts and modifies firmware.
- **[Unblob](https://github.com/onekey-sec/unblob)** β Extracts and analyzes binary blobs.
- **[GDB (GNU Debugger)](https://www.sourceware.org/gdb/)** β Debugging firmware in real-time.
- **[Radare2](https://rada.re/n/)** β Open-source framework for binary analysis.
- **[Capstone](http://www.capstone-engine.org/)** β Disassembly framework for analyzing instruction sets.
- **[Angr](https://angr.io/)** β Python-based binary analysis tool.
- **[Cutter](https://cutter.re/)** β GUI-based alternative to Radare2 for reverse engineering.---
# π¨ Physical Attacks Toolkit
## π οΈ Side-Channel Attacks & Fault Injection
- [**ChipWhisperer**](https://newae.com/) β Open-source side-channel analysis and fault injection tool.
- [**ChipSHOUTER**](https://newae.com/chipshouter/) β Advanced electromagnetic fault injection (EMFI) tool.
- [**GlitchKit**](https://github.com/hexanaut/glitchkit) β Tool for voltage glitching on embedded devices.
- [**Raspberry Pi Pico + PicoEMP**](https://github.com/33Y0KHz/PicoEMP) β DIY EM fault injection tool.
- [**OpenQASM**](https://github.com/Qiskit/openqasm) β Side-channel vulnerability analysis tool for quantum computing.
- [**Riscure Inspector**](https://www.riscure.com/) β Commercial side-channel analysis tool.## π₯ Voltage & Clock Glitching
- [**GlitchKit**](https://github.com/hexanaut/glitchkit) β Software/hardware glitching toolkit.
- [**ChipWhisperer-Lite**](https://newae.com/) β Hardware fault injection tool for glitching.
- [**Proxmark3**](https://proxmark.com/) β RFID/NFC analysis and glitching attacks.
- [**HackRF One**](https://greatscottgadgets.com/hackrf/) β SDR for RF glitching.## π© Hardware Debugging & Tampering
- [**JTAGulator**](http://www.grandideastudio.com/jtagulator/) β Finds JTAG pinouts for debugging.
- [**Shikra**](https://int3.cc/products/the-shikra) β Works with JTAG, UART, and SPI.
- [**Bus Pirate**](http://dangerousprototypes.com/docs/Bus_Pirate) β Multi-protocol debugging interface.
- [**GoodFET**](https://github.com/travisgoodspeed/goodfet) β Open-source JTAG debugging tool.
- [**OpenOCD**](http://openocd.org/) β Open-source JTAG/SWD debugging tool.
- [**Black Magic Probe**](https://github.com/blacksphere/blackmagic) β Open-source debugging tool.## π΄ββ οΈ Chip Decapping & Microprobing
- [**Chemical Decapping Kits**](https://www.micross.com/products/services/die-processing/decapsulation.aspx) β Removes IC protective layers.
- [**FIB (Focused Ion Beam) Tools**](https://www.zeiss.com/microscopy/en/products/fib-sem.html) β Modifies IC internals.
- [**Probe Stations**](https://www.signatone.com/) β Allows direct electrical contact with microchips.## π‘ RFID/NFC Cloning & Attacks
- [**Proxmark3**](https://proxmark.com/) β RFID/NFC cloning and hacking device.
- [**ChameleonMini**](https://github.com/emsec/ChameleonMini) β Open-source NFC emulation tool.
- [**Flipper Zero**](https://flipperzero.one/) β Multi-tool for RFID, NFC, and other hardware hacking.
- [**MFCUK**](https://github.com/nfc-tools/mfcuk) β Cracks Mifare Classic RFID cards.
- [**MFOC**](https://github.com/nfc-tools/mfoc) β Dumps and cracks Mifare Classic keys.## π§² Electromagnetic Attacks & TEMPEST
- [**TempestSDR**](https://github.com/martinmarinov/TempestSDR) β Reads screen emissions via radio signals.
- [**Van Eck Phreaking Kits**](https://github.com/van-eck-phreaking) β Exploits electromagnetic leaks.
- [**USBKill**](https://github.com/hephaest0s/usbkill) β Physically destroys hardware via high-voltage USB.---
# Wireless & Radio Hacking Tools
## π‘ Wi-Fi Hacking Tools
- **[Aircrack-ng](https://www.aircrack-ng.org/)** β Suite for Wi-Fi penetration testing.
- **[Wifite](https://github.com/derv82/wifite2)** β Automated Wi-Fi cracking tool.
- **[Fern Wi-Fi Cracker](https://github.com/savio-code/fern-wifi-cracker)** β GUI tool for Wi-Fi auditing.
- **[Reaver](https://github.com/t6x/reaver-wps-fork-t6x)** β WPS attack tool.
- **[PixieWPS](https://github.com/wiire-a/pixiewps)** β Offline WPS attack tool.
- **[Bettercap](https://www.bettercap.org/)** β Powerful network attack tool, including Wi-Fi attacks.
- **[MDK3](https://github.com/wi-fi-analyzer/mdk3-master)** β Wi-Fi testing and deauthentication tool.
- **[Kismet](https://www.kismetwireless.net/)** β Wireless network detection and monitoring.
- **[Wigle.net](https://wigle.net/)** β Database for mapping Wi-Fi networks.## πΆ Bluetooth & BLE Hacking
- **[Blue Hydra](https://github.com/pwnieexpress/blue_hydra)** β Bluetooth device scanner.
- **[Bluesniff](https://github.com/andrewmichaelsmith/bluesniff)** β Bluetooth packet sniffer.
- **[BtleJack](https://github.com/virtualabs/btlejack)** β Bluetooth Low Energy hijacking tool.
- **[BLE CTF](https://github.com/hackgnar/ble_ctf)** β Bluetooth attack training tool.
- **[Bleah](https://github.com/evilsocket/bleah)** β Bluetooth hacking framework.
- **[BlueRanger](https://github.com/OJ/BlueRanger)** β Detect Bluetooth device distances.
- **[Ubertooth One](https://greatscottgadgets.com/ubertoothone/)** β Open-source Bluetooth monitoring tool.## π» Software-Defined Radio (SDR) Hacking
- **[GNU Radio](https://www.gnuradio.org/)** β Signal processing toolkit for SDR.
- **[HackRF One](https://greatscottgadgets.com/hackrf/)** β Software-defined radio device for hacking.
- **[RTL-SDR](https://www.rtl-sdr.com/)** β Cheap USB SDR receiver.
- **[SDR# (SDRSharp)](https://airspy.com/download/)** β Popular SDR software.
- **[GQRX](http://gqrx.dk/)** β Open-source SDR software.
- **[BladeRF](https://nuand.com/)** β USB 3.0 SDR device for signal analysis.
- **[Red Pitaya](https://www.redpitaya.com/)** β SDR and signal processing platform.
- **[OsmoSDR](https://osmocom.org/projects/sdr/wiki/OsmoSDR)** β Open-source SDR framework.
- **[RFExplorer](https://rfexplorer.com/)** β Portable RF spectrum analyzer.
- **[GR-GSM](https://github.com/ptrkrysik/gr-gsm)** β GSM signal analysis tool.## π‘ RFID/NFC Hacking
- **[Proxmark3](https://proxmark.com/)** β RFID/NFC research tool.
- **[ChameleonMini](https://kasper-oswald.de/chameleonmini/)** β RFID emulator and cloning device.
- **[Flipper Zero](https://flipperzero.one/)** β Multi-tool for wireless attacks, RFID cloning, and more.
- **[MFCUK](https://github.com/nfc-tools/mfcuk)** β Tool for MIFARE Classic card attacks.
- **[MFOC](https://github.com/nfc-tools/mfoc)** β MIFARE Classic offline cracking tool.
- **[NFC Tools](https://www.wakdev.com/en/apps/nfc-tools.html)** β Mobile app for NFC analysis.
- **[RFIDler](https://rfidler.com/)** β Software-defined RFID tool.
- **[Libnfc](https://github.com/nfc-tools/libnfc)** β Library for NFC communication.
- **[ICopy-X](https://icopyx.com/)** β RFID cloning and hacking device.## π GSM & Mobile Network Hacking
- **[OsmocomBB](https://osmocom.org/projects/baseband/wiki)** β Open-source GSM baseband software.
- **[OpenBTS](https://github.com/RangeNetworks/openbts)** β Build your own GSM network.
- **[IMSI Catcher](https://github.com/Oros42/IMSI-catcher)** β Detect IMSI catchers and rogue cell towers.
- **[Stingray Detector](https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector)** β Mobile IMSI catcher detection.
- **[SIMtrace](https://osmocom.org/projects/simtrace/wiki)** β Intercept SIM card communication.---
# π¬ Chip-Level Attack Tools
### π΄ββ οΈ 1. Chip Decapping & Microscopy
- **[Razor Blade & Nitric Acid](https://en.wikipedia.org/wiki/Die_destruction)** β Basic method for removing chip packaging.
- **[FIB (Focused Ion Beam)](https://en.wikipedia.org/wiki/Focused_ion_beam)** β High-end method for modifying IC structures.
- **[Delayering Kits](https://www.microscopy-and-analysis.com/)** β Chemical solutions for peeling off IC layers.
- **[Optical Microscopes](https://www.edmundoptics.com/)** β Inspecting chips post-decapping.
- **[Scanning Electron Microscope (SEM)](https://www.thermofisher.com/)** β Advanced chip imaging.### β‘ 2. Fault Injection & Glitching
- **[ChipWhisperer](https://chipwhisperer.io/)** β Side-channel analysis and fault injection tool.
- **[ChipSHOUTER](https://www.newae.com/chipshouter/)** β Electromagnetic fault injection (EMFI).
- **[GlitchKit](https://github.com/gmbnomis/GlitchKit)** β Glitching framework for embedded systems.
- **[VoltageGlitcher](https://github.com/astarasikov/VoltageGlitcher)** β Fault injection via voltage control.
- **[SPIDriver](https://github.com/robotic-controls/spidriver)** β SPI communication and glitching.### π 3. Power Analysis & Side-Channel Attacks
- **[ChipWhisperer-Nano](https://wiki.newae.com/ChipWhisperer-Nano)** β Low-cost power analysis tool.
- **[Riscure Inspector](https://www.riscure.com/security-tools/inspector-sca/)** β Commercial side-channel attack framework.
- **[OpenADC](https://www.newae.com/chipwhisperer/)** β ADC-based power analysis module.
- **[EM Probe](https://www.langer-emv.de/en/emc-probes/)** β Captures electromagnetic signals from chips.
- **[Kocherβs DPA Toolkit](https://www.cryptography.com/publications/dpa.html)** β Differential Power Analysis (DPA) framework.### π‘ 4. Secure Chip Extraction & Key Recovery
- **[Glitching AES Chips](https://github.com/sidechannel-aes-glitching)** β Bypassing AES protection via fault injection.
- **[Voltage EMIF Fault Injection](https://www.emfi.eu/)** β Extracting keys via voltage spikes.
- **[X-Ray Chip Inspection](https://www.hitachi-hightech.com/)** β Identifying hidden security fuses.
- **[Laser Fault Injection](https://www.riscure.com/)** β Disrupting chip execution to leak data.### π₯ 5. Firmware & ROM Dumping
- **[JTAGulator](http://www.grandideastudio.com/jtagulator/)** β Identifying JTAG pinouts on unknown chips.
- **[Flashrom](https://flashrom.org/)** β Dumping flash memory from ICs.
- **[Bus Pirate](http://dangerousprototypes.com/docs/Bus_Pirate)** β Dumping firmware from SPI/I2C/UART chips.
- **[Dediprog SF100](https://www.dediprog.com/products/SF100)** β High-speed SPI Flash programmer.
- **[EEPROM Dumper](https://github.com/devttys0/firmware-analysis-toolkit)** β Extracting EEPROM contents.---
# π USB & Peripheral Attack Tools
### π΄ββ οΈ 1. USB Exploitation & HID Attacks
- **[Rubber Ducky](https://shop.hak5.org/)** β HID-based keystroke injection tool.
- **[Bash Bunny](https://shop.hak5.org/)** β Advanced automation & attack payloads.
- **[OMG Cable](https://o.mg.lol/)** β Malicious USB cable for remote access.
- **[Evil Crow Cable](https://github.com/EvilCROW-Cables)** β Open-source keystroke injection.
- **[Cactus WHID](https://github.com/whid-injector/WHID)** β USB HID injection with WiFi.
- **[PHUKD/URFUKED](https://samy.pl/urfu/)** β HID-based payload execution.### πΎ 2. USB Data Extraction & Exfiltration
- **[USBHarpoon](https://github.com/0xdea/USBharpoon)** β Data exfiltration via USB.
- **[USaBUSe](https://github.com/jkcvb/USaBUSe)** β Automated USB data theft.
- **[USBExfil](https://github.com/usbexfil/usbexfil)** β Auto-copy data from plugged-in devices.### π 3. USB Impersonation & Spoofing
- **[P4wnP1 A.L.O.A.](https://github.com/RoganDawes/P4wnP1_aloa)** β USB attack framework (HID, WiFi, storage).
- **[USBProxy](https://github.com/dominicgs/USBProxy)** β Man-in-the-Middle (MitM) for USB devices.
- **[USBDriveBy](https://samy.pl/usbdriveby/)** β USB device emulation for bypassing security.
- **[BadUSB](https://github.com/LaBlueFrog/badusb)** β Create malicious USB payloads.### π‘ 4. USB Network Attacks
- **[LAN Turtle](https://shop.hak5.org/)** β USB network implant for remote access.
- **[Packet Squirrel](https://shop.hak5.org/)** β USB network sniffing and payload execution.
- **[WiFi Pineapple](https://shop.hak5.org/)** β Rogue WiFi access point for network MITM.### π₯ 5. USB Firmware & Debugging Exploits
- **[USBKill](https://github.com/hephaest0s/usbkill)** β Automatically disable a system when a USB device is removed.
- **[USBlyzer](https://www.usblyzer.com/)** β USB protocol analyzer for debugging.
- **[USBGuard](https://github.com/dkopecek/usbguard)** β Policy-based USB protection.
- **[FaceDancer](https://github.com/usb-tools/Facedancer)** β USB attack framework for fuzzing & reversing.
- **[GreatFET One](https://greatscottgadgets.com/greatfet/)** β USB debugging and analysis tool.---
# π Hardware Modification & Implantation
### π΄ββ οΈ 1. Hardware Backdoor Implants
- **[NSA COTTONMOUTH](https://en.wikipedia.org/wiki/ANT_catalog)** β USB implant for covert data exfiltration.
- **[NSA IRONCHEF](https://www.schneier.com/blog/archives/2013/12/the_nsas_ironch.html)** β Malicious BIOS/firmware modification for persistence.
- **[NSA DEITYBOUNCE](https://en.wikipedia.org/wiki/ANT_catalog)** β BIOS-level malware for remote access.
- **[BadUSB](https://github.com/samyk/usbdriveby)** β USB firmware modification for keystroke injection.
- **[USBNinja](https://usb-ninja.com/)** β Wireless USB payload injector for remote attacks.
- **[OMG Cable](https://shop.hak5.org/products/omg-cable)** β Malicious USB cable for payload execution.### π 2. BIOS & Firmware Modification
- **[Flashrom](https://flashrom.org/)** β Reads, writes, erases, and verifies BIOS firmware.
- **[UEFI Tool](https://github.com/LongSoft/UEFITool)** β Analyzes and modifies UEFI firmware.
- **[CH341A Programmer](https://www.aliexpress.com/item/32820954869.html)** β USB flash programmer for BIOS modifications.
- **[Bus Pirate](http://dangerousprototypes.com/docs/Bus_Pirate)** β SPI/I2C interface for firmware modifications.
- **[Dediprog SF100](https://www.dediprog.com/products/SF100)** β SPI flash programmer for BIOS recovery.
- **[Intel ME Cleaner](https://github.com/corna/me_cleaner)** β Disables Intel Management Engine.### π 3. Hardware Keyloggers & Data Interceptors
- **[KeyGrabber](https://www.keelog.com/)** β Hardware keylogger that records keystrokes invisibly.
- **[WiFi Keylogger](https://www.keelog.com/wifi-keylogger/)** β Wirelessly transmits keystroke logs over WiFi.
- **[USB Keylogger](https://www.keelog.com/usb-keylogger/)** β Plug-and-play keylogger for USB keyboards.
- **[LAN Tap](https://greatscottgadgets.com/throwingstar/)** β Passive network traffic sniffer.
- **[PS/2 Hardware Keylogger](https://www.keelog.com/ps2-keylogger/)** β Keystroke logger for older PS/2 keyboards.### π© 4. Covert Implants & Surveillance Devices
- **[PwnPlug](https://www.pwnieexpress.com/)** β Covert network implant disguised as a power adapter.
- **[Pwnagotchi](https://pwnagotchi.ai/)** β AI-driven WiFi hacking device.
- **[HackRF One](https://greatscottgadgets.com/hackrf/)** β Wireless SDR for sniffing and modifying radio signals.
- **[Flipper Zero](https://flipperzero.one/)** β Multi-functional hacking device for RFID/NFC access.
- **[NSA RAGEMASTER](https://wikileaks.org/spyfiles/document/National-Security-Agency-NSA-RAGEMASTER-Monitor-Tapping-Hardware-Im-Plant-Description/)** β Covert RF implant that transmits monitor data remotely.
- **[WiFi Pineapple](https://shop.hak5.org/products/wifi-pineapple)** β Wireless network penetration testing device.### β‘ 5. Peripheral Device Hijacking
- **[USB Rubber Ducky](https://shop.hak5.org/products/usb-rubber-ducky)** β Keystroke injection tool disguised as a USB drive.
- **[MalDuino](https://malduino.com/)** β Open-source BadUSB keystroke injection tool.
- **[ESPloitV2](https://github.com/exploitagency/ESPLoiter)** β ESP8266-based WiFi HID attack device.
- **[MouseJack](https://github.com/BastilleResearch/mousejack)** β Exploits vulnerabilities in wireless mice.
- **[AirDrive Forensic Keylogger](https://www.keelog.com/airdrive-keylogger/)** β Wireless keylogger with real-time keystroke transmission.### π¬ 6. Chip-Level Hardware Trojans
- **[ChipWhisperer](https://chipwhisperer.io/)** β Power analysis and fault injection tool.
- **[ChipSHOUTER](https://www.newae.com/chipshouter/)** β Electromagnetic fault injection for security bypassing.
- **[JTAGulator](http://www.grandideastudio.com/jtagulator/)** β Identifies JTAG interfaces on unknown chips.
- **[GlitchKit](https://github.com/gmbnomis/GlitchKit)** β Firmware glitching and fault injection framework.
- **[X-Ray Chip Inspection](https://www.hitachi-hightech.com/)** β Scans chips for hidden implants and modifications.---
# β‘ Power & Battery Attack Tools
### π 1. Power Analysis & Side-Channel Attacks
- **[ChipWhisperer](https://chipwhisperer.io/)** β Side-channel power analysis and fault injection.
- **[Riscure Inspector](https://www.riscure.com/security-tools/inspector-sca/)** β Commercial tool for Differential Power Analysis (DPA).
- **[OpenADC](https://www.newae.com/chipwhisperer/)** β Analog-to-digital converter for power monitoring.
- **[Kocherβs DPA Toolkit](https://www.cryptography.com/publications/dpa.html)** β Used for differential power analysis.
- **[Langer EM Probe](https://www.langer-emv.de/en/emc-probes/)** β Captures electromagnetic emissions from chips.### β‘ 2. Voltage Fault Injection & Glitching
- **[ChipSHOUTER](https://www.newae.com/chipshouter/)** β Electromagnetic fault injection (EMFI).
- **[VoltageGlitcher](https://github.com/astarasikov/VoltageGlitcher)** β Injects voltage glitches to bypass security.
- **[GlitchKit](https://github.com/gmbnomis/GlitchKit)** β Framework for hardware glitching.
- **[SPIDriver](https://github.com/robotic-controls/spidriver)** β SPI-based power glitching tool.
- **[EMFI Kit](https://www.riscure.com/)** β Voltage and electromagnetic fault injection toolkit.### π 3. Power Consumption & Tampering Attacks
- **[USBKill](https://github.com/hephaest0s/usbkill)** β Kills power to devices via USB ports.
- **[Proxmark3](https://github.com/Proxmark/proxmark3/)** β RFID power analysis tool.
- **[Flipper Zero](https://flipperzero.one/)** β Multi-functional device for power manipulation.
- **[Lab Power Supplies](https://www.keysight.com/)** β Precision voltage control for attacks.
- **[Raspberry Pi Pico](https://www.raspberrypi.com/products/raspberry-pi-pico/)** β Can be used for power analysis and manipulation.### π₯ 4. Battery-Based Attacks
- **[Supercapacitor Surge](https://www.supercaptech.com/)** β Disrupts devices with sudden power bursts.
- **[Battery Spoofing](https://www.pentestpartners.com/security-blog/battery-attacks/)** β Modifies power reports to bypass security.
- **[DC Power Attack](https://www.analog.com/en/technical-articles/dc-power-analysis.html)** β Manipulates voltage to damage components.
- **[Inductive Coupling](https://www.researchgate.net/publication/Inductive-Power-Analysis)** β Extracts data through power fluctuations.
- **[Battery Overload](https://www.teardown.com/)** β Overcharges or overheats batteries for attack vectors.---
# π΄ββ οΈ Supply Chain Attack Tools
### π© 1. Hardware Supply Chain Attacks
- **[NSA Cottonmouth](https://en.wikipedia.org/wiki/Cottonmouth_(exploit))** β Covert USB implant with espionage capabilities.
- **[NSA IRATEMONK](https://en.wikipedia.org/wiki/Equation_Group)** β Hard drive firmware injection.
- **[NSA JETPLOW](https://www.schneier.com/blog/archives/2014/03/more_nsa_attacks.html)** β Persistent backdoors in Cisco devices.
- **[NSA SURLYSPAWN](https://electrospaces.blogspot.com/2015/03/nsas-catalog-of-tools-for-hardware.html)** β Secure chip manipulation.
- **[NSA FEEDTHROUGH](https://electrospaces.blogspot.com/2015/03/nsas-catalog-of-tools-for-hardware.html)** β BIOS-level malware persistence.### π 2. Firmware & BIOS Manipulation
- **[UEFI Implant](https://github.com/chipsec/chipsec)** β UEFI firmware analysis and modification.
- **[Thunderstrike](https://trmm.net/Thunderstrike/)** β Exploiting MacBook boot ROM.
- **[BIOS Implant Tools](https://github.com/Cr4sh/BIOS_Intelligence)** β BIOS dumping and modification.
- **[Coreboot](https://www.coreboot.org/)** β Open-source firmware alternative.
- **[Heads](https://github.com/osresearch/heads)** β Secure boot with tamper detection.### π 3. Software Supply Chain Attacks
- **[Poisoned Dependencies](https://github.com/coinbase/supply-chain-security)** β Detecting malicious npm/PyPI packages.
- **[Typosquatting Malware](https://typosquatting-tester.readthedocs.io/en/latest/)** β Identifying typo-based dependency attacks.
- **[Dependency Confusion Attack](https://github.com/visma-prodsec/confused)** β Checking for dependency confusion vulnerabilities.
- **[BadUSB Firmware](https://github.com/hak5darren/USB-Rubber-Ducky)** β Exploiting firmware on USB devices.
- **[Firmware Patching](https://github.com/ReFirmLabs/binwalk)** β Extract and modify firmware images.### π 4. Hardware Implantation
- **[Rogue Raspberry Pi](https://github.com/xychelsea/Raspberry-Pi-Payloads)** β Concealed MITM attack device.
- **[Malicious USB Keylogger](https://github.com/hak5darren/USB-Rubber-Ducky)** β USB-based keystroke logging.
- **[Trojanned ICs](https://www.mitre.org/publications/technical-papers/trust-in-integrated-circuits)** β Compromised microchips.
- **[Intercepted Shipment Attacks](https://www.schneier.com/blog/archives/2013/12/how_the_nsa_tam.html)** β Tampering with hardware in transit.### π‘ 5. Detection & Prevention
- **[SigMF](https://github.com/gnuradio/sigmf-ninja)** β Spectrum analysis to detect implants.
- **[Osquery](https://osquery.io/)** β Querying firmware for anomalies.
- **[YARA Rules](https://github.com/VirusTotal/yara)** β Malware detection in software supply chains.
- **[Binwalk](https://github.com/ReFirmLabs/binwalk)** β Firmware backdoor analysis.
- **[Firmware Integrity Checker](https://github.com/chipsec/chipsec)** β Comparing firmware to clean versions.