scriptingxss / embeddedappsecLinks
Embedded AppSec Best Practices
☆41Updated 2 years ago
Alternatives and similar repositories for embeddedappsec
Users that are interested in embeddedappsec are comparing it to the libraries listed below
Sorting:
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 9 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- ☆42Updated last week
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- Simple Fuzzer is a simple config-file driven block/mutation based fuzzing system☆66Updated last year
- A tool for auditing medical devices and healthcare infrastructure☆21Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- ☆22Updated 8 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Updated 2 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Telco training☆26Updated 6 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- The Dumb Network Fuzzer☆21Updated 2 years ago
- ☆13Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago