aliasrobotics / RCTFLinks
Scenarios of the Robotics CTF (RCTF), a playground to challenge robot security.
☆33Updated 4 years ago
Alternatives and similar repositories for RCTF
Users that are interested in RCTF are comparing it to the libraries listed below
Sorting:
- Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.☆197Updated last year
- Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.☆26Updated 5 years ago
- aztarna, a footprinting tool for robots.☆90Updated 4 years ago
- Penetration testing tool for ROS☆34Updated 2 years ago
- The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotic…☆89Updated 6 years ago
- Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.☆354Updated 10 months ago
- ☆25Updated 4 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated 2 years ago
- A vulnerable C program for testing fuzzers.☆199Updated 2 years ago
- ☆95Updated 3 years ago
- ☆88Updated 7 years ago
- ☆28Updated 2 months ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 2 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Material from ICS Village talk at DEFCON 25☆12Updated 7 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆110Updated 2 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆48Updated 7 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆104Updated last year
- Exploitation and Mitigation Slides☆129Updated last year
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- ☆88Updated 3 years ago
- A tool that automatically creates fuzzing harnesses based on a library☆280Updated 3 years ago
- URGENT/11 detection tool by Armis☆62Updated 5 years ago
- ☆153Updated 3 years ago
- ☆111Updated 11 months ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- Embedded AppSec Best Practices☆41Updated 2 years ago