This type of tooling could be used to attack a system via the hardware itself. It can be used to disable authentication mechanisms or implant nefarious software components.
Missing a favorite tool in this list? Share a tool suggestion and we will review it.
LSE is the place where Linux security experts are trained. With labs, in-depth guides, and a lot of Linux security tools.