HackRF
The HackRF is a Software Defined Radio (SDR) device capable of transmitting and receiving signals across a wide...
Hardware Hacking Tools
Hak5 offers a variety of hardware hacking tools designed for penetration testing, security research, and exploration of various...
Flipper Zero
The Flipper Zero is a versatile, open-source, multi-functional device designed for interaction with various access control systems, radio...
USB Rubber Ducky attack
A USB Rubber Ducky attack involves using a specially programmed USB device that mimics a keyboard to execute...
Hardware fault induction attacks
Hardware fault induction attacks are a class of side-channel attacks where intentional faults are introduced into the hardware...
Chip Decapping Attack
A chip decapping attack involves physically removing the protective casing of a semiconductor device (usually an integrated circuit)...
Voltage or clock glitching attack
Performing a voltage or clock glitching attack requires specialized equipment, a thorough understanding of the target system, and...
Embedded communication protocols
Embedded protocols are communication protocols specifically designed for use in embedded systems, which are dedicated systems that perform...
Purdue Model-IT & OT
The Purdue Model, also known as the Purdue Enterprise Reference Architecture (PERA), is a framework used primarily in...
Modbus and Profinet
Modbus and Profinet are two widely used industrial communication protocols, but they differ in terms of technology, physical...