scriptingxss / owasp-fstmLinks
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
☆436Updated 3 weeks ago
Alternatives and similar repositories for owasp-fstm
Users that are interested in owasp-fstm are comparing it to the libraries listed below
Sorting:
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆828Updated 3 weeks ago
- Damn Vulnerable IoT Device☆212Updated last year
- EMBArk - The firmware security scanning environment☆364Updated last month
- A Virtual environment for Pentesting IoT Devices☆438Updated 2 months ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆778Updated 2 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆704Updated last month
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- the Network Protocol Fuzzer that we will want to use.☆780Updated last year
- OWASP IoT Security Verification Standard (ISVS)☆145Updated 3 weeks ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆71Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆707Updated last year
- A list of lists involving IoT in general☆150Updated 4 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆352Updated last year
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆698Updated 4 years ago
- Attify OS - Distro for pentesting IoT devices☆1,010Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆273Updated last month
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆447Updated last year
- A Bluetooth low energy capture the flag☆726Updated 2 months ago
- Script for searching the extracted firmware file system for goodies!☆30Updated 6 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆87Updated last week
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆223Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆1,172Updated 2 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,509Updated last year
- Collection of writeups on ICS/SCADA security.☆186Updated last week
- Infrastructure powering the pwn.college dojo☆394Updated last week
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆335Updated last year
- List of Bluetooth BR/EDR/LE security resources☆576Updated 3 weeks ago
- cwe_checker finds vulnerable patterns in binary executables☆1,275Updated 6 months ago