Apress / iot-hack-hdbk-practical-guideLinks
Source Code for 'The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things' by Aditya Gupta
☆34Updated 6 years ago
Alternatives and similar repositories for iot-hack-hdbk-practical-guide
Users that are interested in iot-hack-hdbk-practical-guide are comparing it to the libraries listed below
Sorting:
- Bluetooth Low Energy hardware-less HackMe☆102Updated 4 years ago
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- USB testing made easy☆116Updated 2 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 5 years ago
- Binary Analysis Cookbook, published by Packt☆43Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- ☆80Updated 8 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆336Updated last year
- Network and USB protocol fuzzing toolkit.☆69Updated 7 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆23Updated 2 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆158Updated 4 years ago
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Updated 6 months ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆240Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Updated 2 months ago
- ☆18Updated 5 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Updated 8 years ago
- Software Reverse Engineering with Ghidra, published by Packt☆162Updated 2 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- Building binutils for pwntools☆84Updated 2 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆193Updated last month
- ☆53Updated 5 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago
- A curated list of awesome Cisco exploitation resources☆69Updated 8 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Updated 5 years ago
- BlueRepli-Plus☆18Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆62Updated last year