OWASP / IoTGoatLinks
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
☆844Updated 2 months ago
Alternatives and similar repositories for IoTGoat
Users that are interested in IoTGoat are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆439Updated 2 months ago
- A Virtual environment for Pentesting IoT Devices☆439Updated 3 months ago
- Attify OS - Distro for pentesting IoT devices☆1,012Updated 4 years ago
- Vulnerable server used for learning software exploitation☆1,083Updated 5 years ago
- A small collection of vulnerable code snippets☆772Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,177Updated 2 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆849Updated 7 months ago
- the Network Protocol Fuzzer that we will want to use.☆784Updated last year
- A Bluetooth low energy capture the flag☆731Updated 3 months ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆362Updated last year
- Damn Vulnerable IoT Device☆213Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆590Updated 2 months ago
- Repository for information about 0-days exploited in-the-wild.☆842Updated 2 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,517Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆710Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆725Updated 4 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,274Updated last week
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p …☆1,108Updated 3 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆466Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆819Updated 3 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,799Updated 4 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆790Updated 3 months ago
- CTF Cheatsheet☆109Updated 7 months ago
- Tutorials for getting started with Pwntools☆1,527Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆717Updated last week
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆722Updated last year
- Perfect Blue's CTF Writeups☆692Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆146Updated last month
- AppSec Ezine Public Repository.☆1,205Updated 3 weeks ago
- EMBArk - The firmware security scanning environment☆367Updated 2 weeks ago