jandress / IoT_resources
A list of resources for those interested in hardware, embedded, and IoT security
☆57Updated last month
Related projects ⓘ
Alternatives and complementary repositories for IoT_resources
- ☆66Updated last month
- Content related to hardware hacking☆46Updated 5 years ago
- Damn Vulnerable IoT Device☆188Updated 9 months ago
- Advanced: Bluetooth low energy capture the flag☆53Updated last year
- Companion notebooks to the Hardware Hacking Handbook☆61Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆114Updated last year
- ☆41Updated 8 years ago
- Practical Hardware Pentesting, published by Packt☆64Updated last year
- A Virtual environment for Pentesting IoT Devices☆413Updated 7 months ago
- IoT Hacking Kit Details☆17Updated last month
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆29Updated last year
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- Client side tools to play the CTS contest☆44Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆64Updated 3 years ago
- A vehicle network analysis and attack tool.☆17Updated last year
- ☆181Updated 4 years ago
- Hardware Hacking Cheatsheet infograph☆147Updated 9 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆62Updated last month
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Resources to help get started with IoT Pentesting☆165Updated 6 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆98Updated 4 years ago
- An arduino UARTFuzzer☆42Updated 2 years ago
- esoteric☆50Updated 4 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆31Updated 5 years ago
- Resources for Browser Security Research☆25Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆49Updated 6 years ago