scriptingxss / OWASP-IoT-Top-10-2018-Mapping
OWASP IoT Top 10 2018 Mapping Project
☆18Updated 5 years ago
Alternatives and similar repositories for OWASP-IoT-Top-10-2018-Mapping:
Users that are interested in OWASP-IoT-Top-10-2018-Mapping are comparing it to the libraries listed below
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Embedded AppSec Best Practices☆40Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆141Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Content related to hardware hacking☆51Updated 6 years ago
- Cloned from now gone Digitalbond page.☆15Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆105Updated 7 years ago
- ☆41Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 5 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 5 years ago
- Client side tools to play the CTS contest☆46Updated 3 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated last year
- ☆50Updated 5 years ago
- ☆21Updated 4 years ago
- The USB host security assessment tool☆279Updated 6 years ago
- OWASP Embedded Application Security Project☆16Updated 3 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆62Updated 8 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago
- ☆29Updated 8 years ago
- Binary exploitation CTF challenge☆24Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- Presented hardware reverse engineering workshops since 2019☆61Updated 8 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- Advanced: Bluetooth low energy capture the flag☆57Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- ☆67Updated 6 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆31Updated last year
- IoT Penetration Testing Cookbook, published by Packt☆118Updated 2 years ago