nutc4k3 / amazing-iot-security
A list of lists involving IoT in general
☆142Updated 3 years ago
Alternatives and similar repositories for amazing-iot-security:
Users that are interested in amazing-iot-security are comparing it to the libraries listed below
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆409Updated 2 years ago
- A curated list of awesome browser security learning material.☆140Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆422Updated 11 months ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- Awesome information for WebSockets security research☆260Updated 3 years ago
- ELT write-ups repository.☆40Updated 2 years ago
- BIOS Workshop 2023☆26Updated last year
- Write fuzzer with rust☆202Updated last year
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- A structure-aware HTTP fuzzing library☆210Updated 3 months ago
- CTF Write-ups☆19Updated 4 years ago
- Resources to help get started with IoT Pentesting☆164Updated 6 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated last year
- ASLR bypass without infoleak☆159Updated 3 years ago
- Script for searching the extracted firmware file system for goodies!☆28Updated 5 years ago
- Resources for Browser Security Research☆37Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆98Updated 6 months ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆18Updated 9 months ago
- BugBuntu Linux☆154Updated 3 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆63Updated 5 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- ☆105Updated 7 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆211Updated last year
- Slides and videos from my public speeches / conferences☆73Updated 2 months ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆155Updated 11 months ago
- Intentionally vulnerable Android application.☆240Updated 11 months ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆118Updated 2 years ago
- Practice Labs☆86Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71Updated 4 years ago