A curated list of awesome embedded and IoT security resources.
☆2,234Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-embedded-and-iot-security
Users that are interested in awesome-embedded-and-iot-security are comparing it to the libraries listed below
Sorting:
- A Curated list of Security Resources for all connected things☆3,204Feb 20, 2026Updated 2 weeks ago
- A Collection of Hacks in IoT Space so that we can address them (hopefully).☆2,391May 16, 2020Updated 5 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking.☆4,138Dec 30, 2024Updated last year
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆957Nov 20, 2023Updated 2 years ago
- Firmware Analysis and Comparison Tool☆1,423Feb 27, 2026Updated last week
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆867Oct 5, 2025Updated 5 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- IoT漏洞检测平台,支持固件第三方库版本分析。移动安全相关功能移至SecMobile。☆115Jun 22, 2020Updated 5 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,933Oct 10, 2025Updated 5 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,762Apr 3, 2024Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,092May 27, 2022Updated 3 years ago
- EMBA - The firmware security analyzer☆3,380Updated this week
- Defund the Police.☆13,486Jun 7, 2024Updated last year
- ☆374Jul 7, 2024Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,325Apr 10, 2025Updated 10 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,315Dec 7, 2020Updated 5 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,047Jul 21, 2024Updated last year
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆458Mar 22, 2024Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆843Aug 22, 2025Updated 6 months ago
- A collection of android security related resources☆9,260Mar 1, 2026Updated last week
- List of Awesome Advanced Windows Exploitation References☆1,547Jan 13, 2022Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,312Jul 22, 2024Updated last year
- awesome list of browser exploitation tutorials☆2,266Sep 18, 2023Updated 2 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,356Feb 21, 2025Updated last year
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆248Dec 29, 2025Updated 2 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,177Jul 15, 2024Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,194Aug 29, 2023Updated 2 years ago
- 🐶 A curated list of Web Security materials and resources.☆13,144Feb 27, 2026Updated last week
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆360Jan 4, 2024Updated 2 years ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,821Jun 28, 2022Updated 3 years ago
- A curated list of awesome reversing resources☆4,468Aug 19, 2023Updated 2 years ago
- 🤖 A curated list of awesome Internet of Things projects and resources.☆3,860Feb 14, 2026Updated 3 weeks ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,426Mar 1, 2024Updated 2 years ago
- List of Bluetooth BR/EDR/LE security resources☆593Oct 3, 2025Updated 5 months ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- A collection of links related to Linux kernel security and exploitation☆6,368Updated this week
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆835Dec 25, 2025Updated 2 months ago
- List of Awesome Asset Discovery Resources☆2,377Jan 22, 2025Updated last year
- A True Instrumentable Binary Emulation Framework☆5,834Nov 5, 2025Updated 4 months ago