Vulcainreo / DVID
Damn Vulnerable IoT Device
☆202Updated last year
Alternatives and similar repositories for DVID:
Users that are interested in DVID are comparing it to the libraries listed below
- A Virtual environment for Pentesting IoT Devices☆426Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆418Updated 2 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆66Updated 7 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- Solving CTF, one pixel at a time☆23Updated 5 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 5 years ago
- ☆67Updated 7 months ago
- ☆145Updated 5 years ago
- esoteric☆52Updated 4 years ago
- Hands-on workshop on the basics of hardware hacking.☆121Updated last year
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆81Updated 3 years ago
- RE / Binary Exploitation Resources