IamAlch3mist / Awesome-Embedded-Systems-Vulnerability-ResearchLinks
Resources to getting started vulnerability research on IoT/embedded devices.
☆61Updated this week
Alternatives and similar repositories for Awesome-Embedded-Systems-Vulnerability-Research
Users that are interested in Awesome-Embedded-Systems-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- Linux & Android Kernel Vulnerability research and exploitation☆44Updated last year
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- Collection of browser challenges☆137Updated 4 years ago
- ☆178Updated 4 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆117Updated last year
- ☆320Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆158Updated 7 months ago
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago
- ☆99Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 5 months ago
- ☆221Updated 2 weeks ago
- ☆89Updated 2 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆138Updated last month
- A tool for automating setup of kernel pwn challenges☆58Updated 3 weeks ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆114Updated last year
- ☆183Updated last year
- An educational Bochs-based snapshot fuzzer project☆182Updated last month
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆80Updated 7 months ago
- Write-ups for various CTF☆191Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆72Updated 3 weeks ago
- a new class of file structure attacks☆50Updated 2 years ago
- A bunch of V8 resources (with a security focus)☆36Updated this week
- ☆46Updated last year
- ASLR bypass without infoleak☆161Updated 3 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆186Updated last month
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- CTF pwn problem writeup☆39Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆258Updated 7 months ago
- Python library for CTFer☆143Updated 2 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆65Updated 2 months ago