nutc4k3 / amazing-iot-securityLinks
A list of lists involving IoT in general
☆147Updated 3 years ago
Alternatives and similar repositories for amazing-iot-security
Users that are interested in amazing-iot-security are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆435Updated this week
- A Virtual environment for Pentesting IoT Devices☆439Updated last month
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- A full-featured open-source Wi-Fi fuzzer☆195Updated last week
- A curated list of awesome browser security learning material.☆145Updated 2 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆242Updated 5 months ago
- PENIOT: Penetration Testing Tool for IoT☆226Updated 3 years ago
- Resources to help get started with IoT Pentesting☆169Updated 6 years ago
- Software for fuzzing, used on web application pentestings.☆179Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆29Updated 6 years ago
- 🕶 Design fun and insightful CTF challenges☆68Updated 3 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻☆127Updated 3 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆76Updated 5 months ago
- ELT write-ups repository.☆40Updated 2 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆255Updated 11 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆119Updated last year
- BLACKHAT USA2022 PDF Public☆504Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71Updated 5 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆71Updated last year
- ☆113Updated last year
- Intentionally vulnerable Android application.☆300Updated 2 weeks ago
- ☆86Updated 5 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- ☆338Updated 3 years ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- ☆82Updated 7 years ago