Embedded AppSec Best Practices
☆45Oct 22, 2025Updated 5 months ago
Alternatives and similar repositories for embeddedappsec
Users that are interested in embeddedappsec are comparing it to the libraries listed below
Sorting:
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- AutoSecGPT is an AI-power tool that supports security teams to model threats associated with their automotive application to ease the pro…☆13Apr 28, 2025Updated 10 months ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- ESP32 Remote JTAG Host for programming FPGAs☆29Sep 28, 2020Updated 5 years ago
- Some nmap scripts to detetct the infomations of the different ICS Here are 16 main ics protocal scan-scripts include Modbus, S7 and so o…☆31Apr 17, 2018Updated 7 years ago
- It can do reverse dns lookups from a range of given IP's or a whole subnet.☆13Apr 19, 2018Updated 7 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- ☆42Feb 27, 2026Updated 3 weeks ago
- EmbedOS - Embedded security testing virtual machine☆161Oct 21, 2020Updated 5 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Threat Model analysis for MARA modular robot☆26Sep 3, 2019Updated 6 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.☆31Mar 18, 2020Updated 6 years ago
- ICS TestBed Framework☆69Jan 10, 2019Updated 7 years ago
- ☆19May 16, 2019Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- Material from my ICS Village talk at DEFCON 25☆24Jul 28, 2017Updated 8 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- ☆31Apr 4, 2020Updated 5 years ago
- ☆16Oct 12, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆33Jun 26, 2024Updated last year
- OWASP Embedded Application Security Project☆18Jan 17, 2022Updated 4 years ago
- GitHub Repository for the HW CWE SIG☆17Mar 3, 2026Updated 2 weeks ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- ☆32Sep 10, 2025Updated 6 months ago
- ☆23May 28, 2021Updated 4 years ago
- Standalone Satellite Tracker Project based on ESP32 and Micropython☆12Aug 20, 2020Updated 5 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago