nutc4k3 / amazing-iot-security
A list of lists involving IoT in general
☆139Updated 3 years ago
Alternatives and similar repositories for amazing-iot-security:
Users that are interested in amazing-iot-security are comparing it to the libraries listed below
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆405Updated 2 years ago
- A curated list of awesome browser security learning material.☆138Updated 2 years ago
- Hack-A-Sat Qualifiers Writeups☆246Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆421Updated 10 months ago
- BIOS Workshop 2023☆26Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆144Updated 2 years ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆118Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated 11 months ago
- ELT write-ups repository.☆40Updated 2 years ago
- BugBuntu Linux☆153Updated 3 years ago
- Write fuzzer with rust☆202Updated last year
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆184Updated 3 months ago
- Script for searching the extracted firmware file system for goodies!☆28Updated 5 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆95Updated 4 months ago
- ASLR bypass without infoleak☆158Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆731Updated last month
- Awesome information for WebSockets security research☆259Updated 3 years ago
- Resources to help get started with IoT Pentesting☆166Updated 6 years ago
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆47Updated 3 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆208Updated last year
- A full-featured open-source Wi-Fi fuzzer☆181Updated 2 weeks ago
- CTFs and solutions for Linux binary exploitation.☆109Updated 8 months ago
- The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.☆141Updated last year
- ☆294Updated 7 months ago
- ☆104Updated 6 months ago
- Software for fuzzing, used on web application pentestings.☆184Updated 11 months ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻☆123Updated 2 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆147Updated 9 months ago
- PENIOT: Penetration Testing Tool for IoT☆216Updated 2 years ago