OWASP / IoTGoatLinks
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
☆855Updated 3 months ago
Alternatives and similar repositories for IoTGoat
Users that are interested in IoTGoat are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆441Updated 3 months ago
- A Virtual environment for Pentesting IoT Devices☆441Updated 5 months ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆851Updated 9 months ago
- Attify OS - Distro for pentesting IoT devices☆1,016Updated 4 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆590Updated 2 weeks ago
- Script for searching the extracted firmware file system for goodies!☆1,189Updated 2 years ago
- Vulnerable server used for learning software exploitation☆1,090Updated 5 years ago
- A Bluetooth low energy capture the flag☆740Updated 5 months ago
- the Network Protocol Fuzzer that we will want to use.☆789Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆715Updated last year
- EMBArk - The firmware security scanning environment☆370Updated last week
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,532Updated last year
- The Damn Vulnerable Router Firmware Project☆706Updated 4 years ago
- Repository for information about 0-days exploited in-the-wild.☆850Updated 3 weeks ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆819Updated 5 months ago
- Damn Vulnerable IoT Device☆216Updated last year
- This repo is meant to be a list of companies that hire security people full remote.☆454Updated 8 months ago
- Perfect Blue's CTF Writeups☆694Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆818Updated 3 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆1,119Updated 3 years ago
- A small collection of vulnerable code snippets☆781Updated last year
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,823Updated 4 years ago
- A sorted and updated list of security wargame sites.☆1,148Updated last week
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆733Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,537Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆148Updated 3 months ago
- A curated list of awesome embedded and IoT security resources.☆2,202Updated 2 years ago
- Infrastructure powering the pwn.college dojo☆421Updated this week
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆231Updated 2 years ago