Vulcainreo / DVID
Damn Vulnerable IoT Device
☆192Updated 11 months ago
Alternatives and similar repositories for DVID:
Users that are interested in DVID are comparing it to the libraries listed below
- ☆66Updated 3 months ago
- A Virtual environment for Pentesting IoT Devices☆418Updated 9 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆100Updated 4 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆59Updated 3 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆398Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆90Updated 3 months ago
- esoteric☆51Updated 4 years ago
- Hands-on workshop on the basics of hardware hacking.☆116Updated last year
- Solving CTF, one pixel at a time☆23Updated 4 years ago
- Automatic exploit generation for simple linux pwn challenges.☆315Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆86Updated 2 years ago
- Hack-A-Sat Qualifiers Writeups☆245Updated 2 years ago
- OWASP IoT Security Verification Standard (ISVS)☆137Updated 2 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- RSHack - Tool for RSA CTF's challenges☆91Updated 6 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆136Updated 2 months ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆133Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆53Updated last year
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆98Updated 3 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆268Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆306Updated 5 months ago
- Bluetooth Security Assessment Methodology☆113Updated 7 months ago
- ☆115Updated last year
- Web Exploitation Workflow for CTF Challenges☆50Updated 8 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- ☆294Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆158Updated 2 months ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago