nutc4k3 / amazing-iot-security
A list of lists involving IoT in general
☆143Updated 3 years ago
Alternatives and similar repositories for amazing-iot-security:
Users that are interested in amazing-iot-security are comparing it to the libraries listed below
- A Virtual environment for Pentesting IoT Devices☆426Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆418Updated 2 years ago
- Write fuzzer with rust☆203Updated last year
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- A curated list of awesome browser security learning material.☆141Updated 2 years ago
- Resources to help get started with IoT Pentesting☆165Updated 6 years ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- Software for fuzzing, used on web application pentestings.☆184Updated last year
- BIOS Workshop 2023☆26Updated last year
- The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.☆141Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆110Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- A structure-aware HTTP fuzzing library☆212Updated 4 months ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆122Updated last year
- ☆83Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Script for searching the extracted firmware file system for goodies!☆28Updated 5 years ago
- Awesome information for WebSockets security research☆267Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- All challenges from DiceCTF 2023☆72Updated 2 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆250Updated 5 months ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆119Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆233Updated last week
- ASLR bypass without infoleak☆160Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆108Updated 10 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆163Updated 7 months ago
- A list of resources for those interested in hardware, embedded, and IoT security☆65Updated 6 months ago
- BugBuntu Linux☆154Updated 3 years ago
- Writeup for HackerOne H1-415 2020 CTF☆32Updated 5 years ago
- A full-featured open-source Wi-Fi fuzzer☆187Updated last month