scriptingxss / IoTGoat
IoTGoat is a deliberately insecure firmware based on OpenWrt.
☆180Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for IoTGoat
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆207Updated 4 years ago
- Resources to help get started with IoT Pentesting☆165Updated 6 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆257Updated 6 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆350Updated 5 months ago
- [A]ndroid [A]pplication [P]entest [G]uide☆122Updated 5 years ago
- EmbedOS - Embedded security testing virtual machine☆151Updated 4 years ago
- IoT Penetration Testing Cookbook, published by Packt☆117Updated last year
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆471Updated 4 years ago
- r2con2019 - slides and materials☆135Updated 4 years ago
- A Virtual environment for Pentesting IoT Devices☆413Updated 7 months ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆169Updated 7 years ago
- Fuzzing Browsers☆309Updated last year
- The Damn Vulnerable Router Firmware Project☆674Updated 3 years ago
- How to build an efficient pwn development environment in 2020☆258Updated 3 years ago
- A tool for checking exploitability☆210Updated 5 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆347Updated 4 years ago
- Damn Vulnerable IoT Device☆188Updated 9 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆280Updated 6 years ago
- Decept Network Protocol Proxy☆275Updated last year
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- Kinda useful notes collated together publicly☆492Updated 5 years ago
- OWASP IoT Security Verification Standard (ISVS)☆134Updated last year
- collection of verified Linux kernel exploits☆185Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆68Updated 3 years ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆389Updated 2 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 6 years ago