IamAlch3mist / Awesome-Embedded-Systems-Vulnerability-ResearchLinks
Resources to getting started vulnerability research on IoT/embedded devices.
☆87Updated last week
Alternatives and similar repositories for Awesome-Embedded-Systems-Vulnerability-Research
Users that are interested in Awesome-Embedded-Systems-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- Linux & Android Kernel Vulnerability research and exploitation☆55Updated last year
- ☆327Updated last year
- A tool for automating setup of kernel pwn challenges☆60Updated last week
- ☆188Updated 8 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- Collection of browser challenges☆138Updated 4 years ago
- ☆184Updated last year
- ☆249Updated 2 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆273Updated last month
- Write-ups for various CTF☆199Updated last month
- Old and new CTFs about Linux kernel exploitation.☆60Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆81Updated 3 months ago
- ☆94Updated 2 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆86Updated last week
- ASLR bypass without infoleak☆161Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆92Updated last month
- A bunch of V8 resources (with a security focus)☆63Updated last week
- list of organizations offering vulnerability research/reverse engineering jobs☆93Updated last month
- ☆112Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- ropr with some tweaks for better linux kernel support☆31Updated 6 months ago
- ☆86Updated last month
- A collection of my weggli patterns to facilitate vulnerability research.☆146Updated last month
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆59Updated 3 weeks ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆558Updated this week
- prebuilt binaries for multiple architeture☆191Updated 2 years ago
- CTF pwn problem writeup☆38Updated 2 years ago
- Fuzzing Embedded Systems using Hardware Breakpoints☆189Updated last year
- Exploit scripts for ctf challenges that involves linux kernel pwning☆11Updated 10 months ago