OWASP / IoTGoat
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
☆759Updated 4 months ago
Alternatives and similar repositories for IoTGoat:
Users that are interested in IoTGoat are comparing it to the libraries listed below
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆418Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆426Updated last year
- Attify OS - Distro for pentesting IoT devices☆984Updated 3 years ago
- Vulnerable server used for learning software exploitation☆1,046Updated 4 years ago
- Repository for information about 0-days exploited in-the-wild.☆790Updated 2 weeks ago
- EMBArk - The firmware security scanning environment☆339Updated last week
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358Updated 11 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,421Updated 7 months ago
- Damn Vulnerable IoT Device☆202Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆691Updated 6 months ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,722Updated 4 years ago
- Script for searching the extracted firmware file system for goodies!☆1,117Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,785Updated 11 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,195Updated 4 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆687Updated last month
- A curated list of awesome embedded and IoT security resources.☆1,976Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆548Updated this week
- ☆1,002Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆687Updated 4 years ago
- Perfect Blue's CTF Writeups☆677Updated 10 months ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆884Updated 4 months ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆841Updated 3 weeks ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- Don't let buffer overflows overflow your mind☆438Updated 4 years ago
- the Network Protocol Fuzzer that we will want to use.☆755Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,192Updated last year
- A Bluetooth low energy capture the flag☆695Updated 9 months ago
- a tool to analyze filesystem images for security☆499Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆741Updated last month
- Notes about attacking Jenkins servers☆2,052Updated 9 months ago