scriptingxss / IoTGoatLinks
IoTGoat is a deliberately insecure firmware based on OpenWrt.
☆182Updated 5 years ago
Alternatives and similar repositories for IoTGoat
Users that are interested in IoTGoat are comparing it to the libraries listed below
Sorting:
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆267Updated 6 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- A Virtual environment for Pentesting IoT Devices☆427Updated last year
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆691Updated 4 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- Fuzzing Browsers☆311Updated 2 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆478Updated 4 years ago
- Small CTF challenges running on Docker☆159Updated 6 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- Exploitation and Mitigation Slides☆127Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆286Updated 7 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 4 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- The USB host security assessment tool☆281Updated 6 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- Penetration testing and auditing toolkit for Android apps.☆240Updated 3 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆421Updated 3 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago