Samsung / cotopaxiLinks
Set of tools for security testing of Internet of Things devices using specific network IoT protocols
☆362Updated last year
Alternatives and similar repositories for cotopaxi
Users that are interested in cotopaxi are comparing it to the libraries listed below
Sorting:
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- List of the tools and usage☆234Updated 4 months ago
- the Network Protocol Fuzzer that we will want to use.☆782Updated last year
- ☆619Updated 2 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆436Updated last month
- OWASP IoT Security Verification Standard (ISVS)☆145Updated last month
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆212Updated 5 years ago
- Attify OS - Distro for pentesting IoT devices☆1,009Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆698Updated 4 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆476Updated 5 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆832Updated last month
- a tool to analyze filesystem images for security☆506Updated 2 years ago
- PENIOT: Penetration Testing Tool for IoT☆228Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆438Updated 2 months ago
- Search an exploit in the local exploitdb database by its CVE☆172Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆1,173Updated 2 years ago
- A Bluetooth low energy capture the flag☆727Updated 3 months ago
- A ZigBee hacking toolkit by Bishop Fox☆288Updated 4 years ago
- A TCP/UDP based network daemon fuzzer☆524Updated last year
- EmbedOS - Embedded security testing virtual machine☆156Updated 5 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆251Updated 5 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆93Updated 4 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆337Updated last year
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆315Updated 3 years ago
- Kinda useful notes collated together publicly☆497Updated 6 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆450Updated last year
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 8 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- This repo contains alls the vulnerabilities identified as a part of security research against IoT devices☆23Updated 4 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago