scriptingxss / IoTGoatLinks
IoTGoat is a deliberately insecure firmware based on OpenWrt.
☆182Updated 5 years ago
Alternatives and similar repositories for IoTGoat
Users that are interested in IoTGoat are comparing it to the libraries listed below
Sorting:
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- List of the tools and usage☆234Updated last week
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆267Updated 6 years ago
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- Kinda useful notes collated together publicly☆494Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- A Virtual environment for Pentesting IoT Devices☆428Updated last week
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆476Updated 4 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- ☆612Updated 2 years ago
- Damn Vulnerable IoT Device☆211Updated last year
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆692Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- ☆88Updated 7 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆423Updated 3 years ago
- Fuzzing Browsers☆311Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- ☆69Updated 9 months ago
- OWASP IoT Security Verification Standard (ISVS)☆143Updated 2 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago