scriptingxss / IoTGoatLinks
IoTGoat is a deliberately insecure firmware based on OpenWrt.
☆185Updated 5 years ago
Alternatives and similar repositories for IoTGoat
Users that are interested in IoTGoat are comparing it to the libraries listed below
Sorting:
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- List of the tools and usage☆234Updated 7 months ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 8 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Updated 7 years ago
- Resources to help get started with IoT Pentesting☆169Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 8 years ago
- IoT Penetration Testing Cookbook, published by Packt☆121Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆442Updated 5 months ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆85Updated 8 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Updated 5 years ago
- OWASP IoT Security Verification Standard (ISVS)☆148Updated 4 months ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆91Updated 4 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Damn Vulnerable IoT Device☆214Updated last year
- 35C3 Junior CTF pwnables☆149Updated 7 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Updated 7 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆123Updated 6 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆442Updated 4 months ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- How to build an efficient pwn development environment in 2020☆269Updated 5 years ago
- ☆625Updated 3 years ago
- Exploitation and Mitigation Slides☆135Updated last year
- Kinda useful notes collated together publicly☆500Updated 6 years ago
- Search an exploit in the local exploitdb database by its CVE☆171Updated 3 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Files for appsecwiki.com☆120Updated 5 years ago
- Toolkit for implant attack of IoT devices☆137Updated 7 years ago