scriptingxss / embeddedappsec
Embedded AppSec Best Practices
☆41Updated last year
Alternatives and similar repositories for embeddedappsec
Users that are interested in embeddedappsec are comparing it to the libraries listed below
Sorting:
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Fuzz testing framework for network protocols.☆17Updated 4 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- Script for searching the extracted firmware file system for goodies!☆29Updated 5 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- ☆40Updated this week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- ☆20Updated 6 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 5 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 2 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- ☆22Updated 8 years ago
- Metasploit Modules for OPC UA☆32Updated 5 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Updated 5 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆97Updated 7 years ago
- A curated threat modeling library collection☆22Updated last year
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 9 months ago
- ☆29Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- OWASP IoT Security Verification Standard (ISVS)☆141Updated 2 years ago
- IoT Penetration Testing Cookbook, published by Packt☆118Updated 2 years ago
- Python Package for burprestapi☆16Updated 5 years ago