scriptingxss / OWASP-IoT-Top-10-2018-MappingLinks
OWASP IoT Top 10 2018 Mapping Project
☆19Updated 5 years ago
Alternatives and similar repositories for OWASP-IoT-Top-10-2018-Mapping
Users that are interested in OWASP-IoT-Top-10-2018-Mapping are comparing it to the libraries listed below
Sorting:
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- OWASP IoT Security Verification Standard (ISVS)☆143Updated 2 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- A ZigBee hacking toolkit by Bishop Fox☆283Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- PASTA: Portable Automotive Security Testbed with Adaptability☆181Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- List of the tools and usage☆234Updated last month
- The USB host security assessment tool☆281Updated 6 years ago
- Penetration testing framework for ZigBee security research.☆117Updated 7 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆69Updated 10 months ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- ☆94Updated 4 years ago
- ☆21Updated 4 years ago
- Client side tools to play the CTS contest☆48Updated 4 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- Advanced: Bluetooth low energy capture the flag☆59Updated 2 years ago
- ☆42Updated 8 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆183Updated 3 years ago
- Damn Vulnerable IoT Device☆212Updated last year
- Command line utilities for analyzing CANbus traffic☆70Updated 10 years ago
- The OWASP home for the Internet of Things project☆21Updated last year
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- This repository contains reverse engineering results and resources for a few specific car models of a very specific car manufacturer. Ple…☆93Updated 6 years ago
- ☆17Updated 7 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆424Updated 3 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago