IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
☆867Oct 5, 2025Updated 4 months ago
Alternatives and similar repositories for IoTGoat
Users that are interested in IoTGoat are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆443Oct 5, 2025Updated 4 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆709Apr 7, 2021Updated 4 years ago
- A Curated list of Security Resources for all connected things☆3,206Feb 20, 2026Updated last week
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- A curated list of awesome embedded and IoT security resources.☆2,233Oct 17, 2023Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆443Aug 25, 2025Updated 6 months ago
- EmbedOS - Embedded security testing virtual machine☆161Oct 21, 2020Updated 5 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆836Aug 22, 2025Updated 6 months ago
- Damn Vulnerable IoT Device☆216Feb 12, 2024Updated 2 years ago
- Firmware Analysis and Comparison Tool☆1,420Feb 19, 2026Updated last week
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,046Jul 21, 2024Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,191Aug 29, 2023Updated 2 years ago
- Attify OS - Distro for pentesting IoT devices☆1,020Aug 26, 2021Updated 4 years ago
- EMBA - The firmware security analyzer☆3,371Updated this week
- A fork and successor of the Sulley Fuzzing Framework☆2,316Feb 15, 2026Updated 2 weeks ago
- OWASP IoT Security Verification Standard (ISVS)☆148Oct 6, 2025Updated 4 months ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆832Dec 25, 2025Updated 2 months ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- IoT固件漏洞复现环境☆1,261Jul 30, 2023Updated 2 years ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆457Feb 7, 2024Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,455Jan 15, 2026Updated last month
- A Bluetooth low energy capture the flag☆746Aug 11, 2025Updated 6 months ago
- A True Instrumentable Binary Emulation Framework☆5,827Nov 5, 2025Updated 3 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,716Jun 3, 2024Updated last year
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆457Mar 22, 2024Updated last year
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,755Apr 3, 2024Updated last year
- Advanced: Bluetooth low energy capture the flag☆65Aug 4, 2023Updated 2 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- a tool to analyze filesystem images for security☆512Oct 8, 2023Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- Automated Adversary Emulation Platform☆6,781Updated this week
- EMBArk - The firmware security scanning environment☆374Jan 16, 2026Updated last month
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,257Apr 12, 2024Updated last year
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,751Oct 24, 2024Updated last year
- A list of resources for those interested in hardware, embedded, and IoT security☆75Oct 6, 2024Updated last year
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- Some IOT Integration of Technical Articles☆191Dec 9, 2022Updated 3 years ago