HardBreak - Hardware Hacking Wiki
Last updated
Was this helpful?
Last updated
Was this helpful?
This page is a free and collaborative wiki about hardware hacking!
The goal of HardBreak () is to collect knowledge about Hardware Hacking / IoT hacking in one place. There are many great blogs about Hardware Hacking, but it is a rather unpleasant experience to search through multiple blogs in different formats to find the information you need. HardBreak aims to organize all information in one accessible and easy-to-use platform.
🎉 We just launched our HardBreak Discord Server! 🎉
If you:
Want to discuss hardware hacking and IoT security
Share the project you are working on
Have feedback or requests for new content on our wiki
Come be a part of our growing community of hardware hackers⚡
In this chapter we give you guidance on how to start hardware hacking:
What first target device to choose
Essential tools to start with
Top down approach to follow and investigate your device
We strongly encourage anyone interested to contribute their knowledge and insights. By sharing your discoveries or improving existing content, you help build a valuable resource for everyone.
To contribute:
While this wiki is built with the best knowledge and intentions from our contributors, it may contain errors. We encourage users to double-check any advice or strategies before applying them in practice. If you spot an issue, please help us by reporting it or making an edit!
The strategies and advice shared on this site are for educational and informational purposes only. They should not be used for any unlawful or harmful activities. We do not endorse or encourage any illegal or unethical conduct. Use the information here responsibly and at your own risk.
Join us here 👉
Hey! I’m Jonas Rosenberger, the creator of HardBreak. I’d love to hear your feedback or help out with any projects you’re working on. Feel free to reach out on or Discord (f_3nter)!
A hands on
(, and )
(, )
:
Introduction to different protocols: e.g.,, , , , ..
How to and use those protocols
using debug protocols
Introduction to
How to
How to analyze protocols: a drone
Tools (,)
Protocols (, ) and how to hack them
Submit a pull request on our
Help us keep the content accurate—if you notice an error, please report it so we can correct it quickly! Reach out on or
Check out our for a step-by-step tutorial to making your first pull request!
Introduction
How to start
Basics
Hardware Hacking Tools
Hardware Hacking
Extracting Firmware using UART
Reverse Engineering
Hacking a drone