Vulcainreo / DVID
Damn Vulnerable IoT Device
☆197Updated last year
Alternatives and similar repositories for DVID:
Users that are interested in DVID are comparing it to the libraries listed below
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆406Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆118Updated last year
- A list of resources for those interested in hardware, embedded, and IoT security☆64Updated 4 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆101Updated 4 years ago
- A Virtual environment for Pentesting IoT Devices☆422Updated 10 months ago
- Write ups for Ph0wn CTF☆41Updated 2 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- ☆66Updated 4 months ago
- Automatic exploit generation for simple linux pwn challenges.☆315Updated last year
- esoteric☆51Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Exploitation and Mitigation Slides☆127Updated 8 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆95Updated 4 months ago
- Hack-A-Sat Qualifiers Writeups☆246Updated 2 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆93Updated 3 years ago
- ☆159Updated 2 years ago
- RE / Binary Exploitation Resources☆69Updated 7 years ago
- Bluetooth Security Assessment Methodology☆112Updated 8 months ago
- Advanced: Bluetooth low energy capture the flag☆54Updated last year
- Here are the challenges (including sources) of the GreHack CTF.☆100Updated 9 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆530Updated this week
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆133Updated 2 years ago
- Collection of writeups on ICS/SCADA security.☆169Updated last month
- ☆183Updated last year
- Vulnerability examples.☆402Updated 9 months ago
- A CTF framework to create, build, deploy and monitor challenges☆110Updated 4 months ago
- 👹☆56Updated 3 years ago
- A cheat sheet for attacking SQLite via SQLi☆96Updated 8 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆313Updated 6 months ago
- ☆141Updated 5 years ago