IamAlch3mist / Awesome-Embedded-Systems-Vulnerability-ResearchLinks
Resources to getting started vulnerability research on IoT/embedded devices.
☆89Updated last month
Alternatives and similar repositories for Awesome-Embedded-Systems-Vulnerability-Research
Users that are interested in Awesome-Embedded-Systems-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- Linux & Android Kernel Vulnerability research and exploitation☆55Updated last year
- Collection of browser challenges☆138Updated 4 years ago
- ☆328Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated last week
- ☆255Updated 3 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- ☆189Updated 9 months ago
- All Files, Scripts, and exploits can be found here☆68Updated 4 years ago
- Write-ups for various CTF☆200Updated 2 months ago
- Old and new CTFs about Linux kernel exploitation.☆61Updated 3 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆81Updated 4 months ago
- A bunch of v8 resources (with a security focus)☆71Updated last week
- ☆185Updated last year
- A tool for automating setup of kernel pwn challenges☆60Updated 3 weeks ago
- ☆95Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆278Updated this week
- A collection of my weggli patterns to facilitate vulnerability research.☆148Updated last week
- a new class of file structure attacks☆57Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆123Updated this week
- list of organizations offering vulnerability research/reverse engineering jobs☆98Updated 2 months ago
- Linux kernel privilege escalation techniques☆147Updated last year
- ASLR bypass without infoleak☆163Updated 4 years ago
- An educational Bochs-based snapshot fuzzer project☆217Updated 3 weeks ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆94Updated last week
- Same-Architecture Firmware Rehosting and Fuzzing☆125Updated 11 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆166Updated last year
- CTF pwn problem writeup☆38Updated 2 years ago
- ☆113Updated last year
- Kernel development & exploitation practice environment.☆241Updated 2 years ago
- prebuilt binaries for multiple architeture☆193Updated 2 years ago