fkie-cad / awesome-embedded-and-iot-securityLinks
A curated list of awesome embedded and IoT security resources.
☆2,089Updated last year
Alternatives and similar repositories for awesome-embedded-and-iot-security
Users that are interested in awesome-embedded-and-iot-security are comparing it to the libraries listed below
Sorting:
- A Curated list of Security Resources for all connected things☆2,987Updated last month
- A Collection of Hacks in IoT Space so that we can address them (hopefully).☆2,294Updated 5 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,260Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,020Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,816Updated 2 months ago
- awesome list of browser exploitation tutorials☆2,214Updated 2 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆809Updated 9 months ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking.☆3,584Updated 8 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,615Updated last year
- List of Awesome Advanced Windows Exploitation References☆1,514Updated 3 years ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆914Updated last year
- A curated list of awesome reversing resources☆4,331Updated 2 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆353Updated last year
- Cybersecurity oriented awesome list☆2,334Updated this week
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,698Updated 3 years ago
- Collection of the cheat sheets useful for pentesting☆4,130Updated last year
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆286Updated 9 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆431Updated 3 years ago
- ☆334Updated last year
- Tools, tips, tricks, and more for exploring ICS Security.☆1,848Updated 5 months ago
- Linux Binary Exploitation☆1,342Updated 4 years ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,581Updated 2 weeks ago
- List of Bluetooth BR/EDR/LE security resources☆568Updated last year
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,128Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆4,889Updated last year
- A list of Reverse Engineering articles, books, and papers☆2,553Updated 2 years ago
- A curated list of hacking environments where you can train your cyber skills legally and safely☆4,028Updated last year
- A big list of Android Hackerone disclosed reports and other resources.☆1,590Updated last week
- Attify OS - Distro for pentesting IoT devices☆1,006Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,684Updated this week