TimeHammer is a security testing tool designed for authorized penetration testing, security research, and testing of IoT/embedded devices in controlled environments.
This tool should NEVER be used:
- On production systems
- Without explicit authorization
- On networks you don't own or control
- For malicious purposes
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability in TimeHammer itself (not in target devices you're testing), please report it responsibly:
- Do NOT open a public GitHub issue
- Email the maintainer at: github@hexlab.xyz
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
When using TimeHammer:
- Isolated Networks Only: Use in isolated lab environments
- Authorization: Get written permission before testing
- Documentation: Log all testing activities
- Reversible Changes: Ensure attacked devices can be restored
- No Production: Never test production systems
If you find vulnerabilities in devices/software while using TimeHammer:
- Do not publicly disclose before notifying the vendor
- Follow the vendor's responsible disclosure policy
- Allow reasonable time for patches (typically 90 days)
- Consider coordinating through CERT/CC
Unauthorized access to computer systems is illegal. TimeHammer is provided for educational and authorized security testing purposes only. Users are responsible for complying with all applicable laws and regulations.
The authors and contributors of TimeHammer are not responsible for any misuse or damage caused by this tool.