nutc4k3 / amazing-iot-securityLinks
A list of lists involving IoT in general
☆150Updated 4 years ago
Alternatives and similar repositories for amazing-iot-security
Users that are interested in amazing-iot-security are comparing it to the libraries listed below
Sorting:
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆436Updated 3 weeks ago
- Script for searching the extracted firmware file system for goodies!☆30Updated 6 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆193Updated last month
- A curated list of awesome browser security learning material.☆144Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆438Updated 2 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- ☆113Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆245Updated 6 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- 🕶 Design fun and insightful CTF challenges☆68Updated 3 years ago
- ☆53Updated 5 years ago
- Awesome information for WebSockets security research☆276Updated 3 years ago
- ELT write-ups repository.☆40Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- BIOS Workshop 2023☆26Updated last year
- Resources for Browser Security Research☆44Updated 3 years ago
- Slides & Hands-on for the reverse engineering workshop☆183Updated 2 years ago
- A structure-aware HTTP fuzzing library☆218Updated 10 months ago
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- Software for fuzzing, used on web application pentestings.☆179Updated last year
- Resources to help get started with IoT Pentesting☆169Updated 6 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ASLR bypass without infoleak☆161Updated 3 years ago
- ☆277Updated 3 years ago
- Damn Vulnerable IoT Device☆212Updated last year
- BLACKHAT USA2022 PDF Public☆504Updated 3 years ago
- PENIOT: Penetration Testing Tool for IoT☆226Updated 3 years ago