jandress / IoT_resources
A list of resources for those interested in hardware, embedded, and IoT security
☆64Updated 5 months ago
Alternatives and similar repositories for IoT_resources:
Users that are interested in IoT_resources are comparing it to the libraries listed below
- Content related to hardware hacking☆50Updated 5 years ago
- Companion notebooks to the Hardware Hacking Handbook☆70Updated 3 years ago
- ☆68Updated 5 months ago
- Advanced: Bluetooth low energy capture the flag☆56Updated last year
- Hands-on workshop on the basics of hardware hacking.☆118Updated last year
- Zigator: A security analysis tool for Zigbee and Thread networks☆30Updated last year
- Practical Hardware Pentesting, published by Packt☆69Updated 2 years ago
- A vehicle network analysis and attack tool.☆111Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Hardware Hacking Cheatsheet infograph☆149Updated last year
- Client side tools to play the CTS contest☆46Updated 3 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆96Updated 5 months ago
- Damn Vulnerable IoT Device☆201Updated last year
- Riscure Hack Me embedded hardware CTF 2017-2018.☆86Updated 6 years ago
- CSAW Embedded Security Challenge 2019☆33Updated 5 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆407Updated 2 years ago
- Write ups for Ph0wn CTF☆41Updated 2 months ago
- A vehicle network analysis and attack tool.☆17Updated last year
- Resources to help get started with IoT Pentesting☆164Updated 6 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 4 years ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆74Updated 4 months ago
- A Virtual environment for Pentesting IoT Devices☆423Updated 11 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆43Updated last month
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆58Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆102Updated 4 years ago
- ☆41Updated 8 years ago
- ☆299Updated 8 months ago
- A curated list of Capture The Signal CTF related stuff☆14Updated 3 years ago
- RE / Binary Exploitation Resources☆70Updated 7 years ago