scriptingxss / embeddedappsec
Embedded AppSec Best Practices
☆40Updated last year
Related projects: ⓘ
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆46Updated 4 years ago
- ☆34Updated 2 months ago
- Script for searching the extracted firmware file system for goodies!☆27Updated 5 years ago
- ☆23Updated this week
- ☆27Updated 7 years ago
- Fuzz testing framework for network protocols.☆16Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆99Updated 2 years ago
- A curated threat modeling library collection☆21Updated 9 months ago
- H2HC 2019 Slides/Materials/Presentations☆57Updated 4 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆31Updated 5 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 3 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- ☆21Updated 7 years ago
- ☆28Updated 7 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆26Updated last year
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 weeks ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆80Updated 3 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆27Updated 8 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆100Updated 6 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 8 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆43Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆133Updated last year
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆68Updated 3 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆18Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆49Updated 8 years ago