IoTSecurity101

IoT Security Guide

A curated collection of IoT security resources and guides

A Curated list of IoT Security Resources

GitHub

3k stars
114 watching
496 forks
last commit: about 1 month ago
awesomeawesome-iotawesome-listawesome-listsembedded-devicesfirmwarefirmware-pentestinghardwarehardware-hackingiotiot-deviceiot-securitylinuxpentesting-guidesradio

contribute 2,726 about 1 month ago You are welcome to fork and
ICS-Security 2,726 about 1 month ago
Automotive-Security 2,726 about 1 month ago

๐Ÿ› ๏ธ Approach Methodology / ๐Ÿ“‘ Contents Overview / ๐Ÿ›ก๏ธ IoT Security Information

๐Ÿข IoT Lab Setup Guide for Corporate/Individual

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Technical Research and Hacking

Subaru Head Unit Jailbreak 554 about 4 years ago
Jeep Hack
Dropcam Hacking
Printer Hacking Live Sessions - Gamozo Labs
LED Light Hacking
PS4 Jailbreak โ€“ the current status
Your Lenovo Watch X Is Watching You & Sharing What It Learns
Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT
Besder 6024PB-XMA501 IP camera security analysis 21 about 2 years ago
Smart Lock Vulnerabilities

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Proof of Concepts known Device Vulnerabilities

IoT-Vuln-with CVE and PoC of tenda and dlink 21 7 months ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Community and Discussion Platforms

IoTSecurity101 Telegram
IoTSecurity101 Reddit
IoTSecurity101 Discord
Hardware Hacking Telegram
RFID Discord Group
ICS Discord Group

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / IoT and Hardware Security Trainings

opensecuritytraining 2

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Books for IoT Penetration Testing

The Firmware Handbook (Embedded Technology) 1st Edition by Jack Ganssle
Hardware Hacking: Have Fun while Voiding your Warranty 1st Edition
Linksys WRT54G Ultimate Hacking 1st Edition by Paul Asadoorian
Hacking the Xbox - An Introduction to Reverse Engineering HACKING THE XBOX by Andrew โ€œbunnieโ€ Huang
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure by Eric D. Knapp , Raj Samani
Android Hacker's Handbook by Joshua J. Drake
The Art of Pcb Reverse Engineering: Unravelling the Beauty of the Original Design
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts 1st Edition, by Nitesh Dhanjani
Learning Linux Binary Analysis By Ryan "elfmaster" O'Neill
Car hacker's handbook by Craig Smith
IoT Penetration Testing Cookbook By Aaron Guzman , Aditya Gupta
Inside Radio: An Attack and Defense Guide by Authors: Yang, Qing, Huang, Lin
Pentest Hardware 492 over 5 years ago
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition 5th Edition by Daniel Regalado , Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness , Branko Spasojevic , Ryan Linn , Stephen Sims
Practical Hardware Pentesting
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Front Cover Jasper van Woudenberg, Colin O'Flynn
Practical IoT Hacking-The Definitive Guide to Attacking the Internet of Things by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
Manual PCB-RE: The Essentials
PatrIoT: practical and agile threat research for IoT by Emre Sรผren
Practical Hardware Pentesting - Second Edition
Blue Fox: Arm Assembly Internals & Reverse Engineering
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
Hardware Security Training, Hands-on!
Automotive Cybersecurity Engineering Handbook: The automotive engineer's roadmap to cyber-resilient vehicles Series
Embedded Systems Security and TrustZone
Microcontroller Exploits
Metasploit, 2nd Edition
Engineering Secure Devices
The Ultimate Hardware Hacking Gear Guide 181 4 months ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Awesome CheatSheets

Hardware Hacking cheat sheet 147 9 months ago
Nmap 108 4 months ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Search Engines for Internet-Connected Devices

Shodan
Censys
ZoomEye
BinaryEdge
Thingful
Wigle
Hunter.io
BuiltWith
NetDB
Recon-ng 4,082 21 days ago
PublicWWW

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / YouTube Channels for IoT Pentesting

Joe Grand
Liveoverflow
Binary Adventure
EEVBlog
Craig Smith
iotsecurity101
Besim ALTINOK - IoT - Hardware - Wireless
Ghidra Ninja
Cyber Gibbons
Scanline
Aaron Christophel
Valerio Di Giampietro

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Vehicle Security Resources

https://github.com/jaredthecoder/awesome-vehicle-security 3,173 3 months ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / IoT Vulnerabilites Checking Guides

Reflecting upon OWASP TOP-10 IoT Vulnerabilities
OWASP IoT Top 10 2018 Mapping Project
Hardware toolkits for IoT security analysis

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / IoT Gateway Software

Webthings by Mozilla - RaspberryPi

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / IoT Pentesting OSes

Sigint OS- LTE IMSI Catcher
Instatn-gnuradio OS - For Radio Signals Testing 161 6 months ago
Ubutnu Best Host Linux for IoT's - Use LTS
Internet of Things - Penetration Testing OS v1
Dragon OS - DEBIAN LINUX WITH PREINSTALLED OPEN SOURCE SDR SOFTWARE
EmbedOS - Embedded security testing virtual machine 152 about 4 years ago
Skywave Linux- Software Defined Radio for Global Online Listening
A Small, Scalable Open Source RTOS for IoT Embedded Devices
ICS - Controlthings.io
AttifyOS - IoT Pentest OS - by Aditya Gupta 953 about 3 years ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Exploitation Tools

Expliot - IoT Exploitation framework - by Aseemjakhar
Routersploit (Exploitation Framework for Embedded Devices) 12,208 29 days ago
IoTSecFuzz (comprehensive testing for IoT device)
HomePwn - Swiss Army Knife for Pentesting of IoT Devices 878 almost 2 years ago
killerbee - Zigbee exploitation 764 about 1 year ago
PRET - Printer Exploitation Toolkit 3,935 4 months ago
HAL โ€“ The Hardware Analyzer 626 11 days ago
FwAnalyzer (Firmware Analyzer) 492 about 1 year ago
ISF(Industrial Security Exploitation Framework 247 about 4 years ago
PENIOT: Penetration Testing Tool for IoT 209 over 2 years ago
MQTT-PWN 367 4 months ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Reverse Engineering Tools

IDA Pro : An interactive disassembler that provides extensive information about binary code and is widely used for static analysis
GDB : The GNU Project Debugger allows you to see what is going on 'inside' another program while it executes or what another program was doing at the moment it crashed
Radare2 : An open-source framework for reverse engineering and analyzing binaries; includes a disassembler for multiple architectures
Cutter : A Qt and C++ GUI for Radare2, aiming to provide a more user-friendly interface as well as additional features
Ghidra : A software reverse engineering suite of tools developed by NSA that includes a decompiler, assembler, disassembler, and other tools to analyze binaries
Binary Ninja : A reverse engineering platform that is an alternative to IDA Pro, with a focus on binary analysis for security research and reverse engineering
OllyDbg : An x86 debugger that emphasizes binary code analysis, which is useful for reverse engineering and finding security vulnerabilities
x64dbg : An open-source x64/x32 debugger for windows with a focus on plugin support and scriptability
Hopper : A reverse engineering tool for macOS and Linux that lets you disassemble, decompile and debug your applications
Immunity Debugger : A powerful debugger for analyzing malware and reverse engineering with an integrated Python scripting interface for automation
PEiD : A tool that detects most common packers, cryptors, and compilers for PE files and is useful for reverse engineering of malware

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Introduction

Introduction to IoT
IoT Architecture
IoT attack surface
IoT Protocols Overview

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / IoT Web and Message Services

Introduction to MQTT
MQTT Broker Security - 101
Hacking the IoT with MQTT
Are Smart Homes Vulnerable to Hacking?
Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)
Eclipse Mosquitto MQTT broker 2.0.9 - 'mosquitto' Unquoted Service Path
IoT Security: RCE in MQTT Protocol
Penetration testing of Sesame Smart door lock
CVE-2020-13849 : A vulnerability in MQTT protocol 3.1.1, allowing remote attackers to cause a denial of service. CVSS score: 7.5 (High)
CVE-2023-3028 : Involves insufficient authentication in MQTT backend, leading to potential data access and manipulation. CVSS score: 9.8 (Critical)
CVE-2021-0229 : Pertains to uncontrolled resource consumption in Juniper Networks Junos OS MQTT server. CVSS score: 5.3 (Medium)
CVE-2019-5432 : A malformed MQTT Subscribe packet can crash MQTT Brokers. CVSS score: 7.5 (High)
Using IoT MQTT for V2V and Connected Car
MQTT with Hardware Development Information
IoT Live Demo: 100,000 Connected Cars with Kubernetes, Kafka, MQTT, TensorFlow
Nmap MQTT Library
The Seven Best MQTT Client Tools
A Guide to MQTT by Hacking a Doorbell to Send Push Notifications (Video)
Understanding the MQTT Protocol Packet Structure
Authenticating & Authorizing Devices Using MQTT with Auth0
Deep Learning UDF for MQTT IoT Sensor Data Anomaly Detection 289 11 months ago
IoXY - MQTT Intercepting Proxy
Mosquitto - An Open Source MQTT Broker
HiveMQ
MQTT Explorer
Welcome to MQTT-PWN!
WailingCrab Malware Evolves Using MQTT for Stealthier C2 Communication
Alert: New WailingCrab Malware Loader
MQTT on Snapcraft
Introduction
CoAP client Tools
CoAP Pentest Tools
Nmap - NSE for coap

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / RADIO HACKER QUICK START GUIDE

Complete course in Software Defined Radio (SDR) by Michael Ossmann
SDR Notes - Radio IoT Protocols Overview 158 11 months ago
Understanding Radio
Introduction to Software Defined Radio
Introduction Gnuradio companion
Creating a flow graph in gunradiocompanion
Analysing radio signals 433Mhz
Recording specific radio signal
Replay Attacks with raspberrypi -rpitx

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Cellular Hacking GSM BTS

Awesome-Cellular-Hacking 2,905 14 days ago
what is base tranceiver station
How to Build Your Own Rogue GSM BTS
5Ghoul - 5G NR Attacks & 5G OTA Fuzzing 513 22 days ago
Introduction to GSM Security
GSM Security 2
vulnerabilities in GSM security with USRP B200
Security Testing 4G (LTE) Networks
Case Study of SS7/SIGTRAN Assessment
Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP 89 almost 5 years ago
ss7MAPer โ€“ A SS7 pen testing toolkit
Introduction to SIGTRAN and SIGTRAN Licensing
SS7 Network Architecture
Introduction to SS7 Signaling
Breaking LTE on Layer Two
LTE Sniffer 1,792 30 days ago
Fake BTS Detector (SCL-8521)

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / NFC-RFID

List of RFID/NFC Security & Privacy talks 135 about 1 month ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Zigbee ALL Stuff

Introduction and protocol Overview
Hacking Zigbee Devices with Attify Zigbee Framework
Hands-on with RZUSBstick
ZigBee & Z-Wave Security Brief
Hacking ZigBee Networks
Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes
Security Analysis of Zigbee Networks with Zigator and GNU Radio
Low-Cost ZigBee Selective Jamming
zigbear 27 almost 5 years ago
ZigDiggity 261 about 3 years ago
Zigator 29 over 1 year ago
Z3sec 108 almost 7 years ago
APIMOTE IEEE 802.15.4/ZIGBEE SNIFFING HARDWARE
RaspBee-The Raspberry Pi Zigbee gateway
USRP SDR 2
ATUSB IEEE 802.15.4 USB Adapter
nRF52840-Dongle

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / BLE Intro and SW-HW Tools to pentest

awesome-bluetooth-security 518 12 months ago
BLE-NullBlr: Step By Step guide to BLE Understanding and Exploiting 8 about 5 years ago
Traffic Engineering in a Bluetooth Piconet (PDF)
BLE Characteristics: A Beginner's Tutorial
Bluing - An intelligence gathering tool for hacking Bluetooth 757 over 1 year ago
btproxy 515 over 4 years ago
hcitool & bluez
Testing With GATT Tool
crackle - Cracking encryption 845 about 3 years ago
bettercap 16,771 6 days ago
BtleJuice Bluetooth Smart Man-in-the-Middle framework 744 about 6 years ago
gattacker 706 almost 3 years ago
BTLEjack Bluetooth Low Energy Swiss army knife 1,918 4 months ago
DEDSEC-Bluetooth-exploit 30 6 months ago
BrakTooth Proof of Concept-Blutooth Classic Attacks 447 3 months ago
sweyntooth_bluetooth_low_energy_attacks Public 281 almost 3 years ago
esp32_bluetooth_classic_sniffer Public 506 over 1 year ago
NRFCONNECT - 52840
EDIMAX
CSR 4.0
ESP32 - Development and learning Bluetooth
Ubertooth 1,947 10 months ago
Sena 100
ESP-WROVER-KIT-VB
Blue2thprinting: Answering the Question of 'WTF am I even looking at?!'
Open Wounds: The Last 5 Years Have Left Bluetooth to Bleed
It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic...
Bluetooth vs BLE Basics 8 about 5 years ago
Examining the August Smart Lock
Finding Bugs in Bluetooth
Intel Edison as Bluetooth LE โ€” Exploit Box
How I Reverse Engineered and Exploited a Smart Massager
My Journey Towards Reverse Engineering a Smart Band โ€” Bluetooth-LE RE
Bluetooth Smartlocks
I Hacked MiBand 3
GATTacking Bluetooth Smart Devices
Bluetooth Beacon Vulnerability
Sweyntooth Vulnerabilities
AIRDROP_LEAK - Sniffs BLE Traffic and Displays Status Messages from Apple Devices 2,094 about 1 year ago
BRAKTOOTH: Causing Havoc on Bluetooth Link Manager
Practical Introduction to BLE GATT Reverse Engineering: Hacking the Domyos EL500
MojoBox - Yet Another Not So Smartlock
Bluetooth-Hacking 132 8 months ago
Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023] 495 10 months ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / DECT (Digital Enhanced Cordless Telecommunications)

Real Time Interception And Monitoring Of A DECT Cordless Telephone
Eavesdropping On Unencrypted DECT Voice Traffic
Decoding DECT Voice Traffic: In-depth Explanation

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Mobile security (Android & iOS)

Android App Reverse Engineering 101 A comprehensive guide to reverse engineering Android applications
Android Application Pentesting Book A detailed book on penetration testing techniques for Android devices
Android Pentest Video Course - TutorialsPoint A series of video tutorials on Android penetration testing
Android Tamer A Virtual/Live Platform for Android Security professionals, offering tools and environment for Android security
iOS Pentesting A guide to penetration testing in iOS environments
OWASP Mobile Security Testing Guide The Open Web Application Security Project's guide for mobile security testing, applicable to iOS

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Villages

Payment Villages
ICS Village
IoT Villages
RF hackers
Car Hacking Village

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Online Assemblers

AZM Online Arm Assembler by Azeria
Online Disassembler
Compiler Explorer is an interactive online compiler which shows the assembly output of compiled C++, Rust, Go

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / ARM

Azeria Labs
ARM EXPLOITATION FOR IoT
Damn Vulnerable ARM Router (DVAR)
EXPLOIT.EDUCATION

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Pentesting Firmwares and emulating and analyzing

EMBA-An analyzer for embedded Linux firmware
FACT-Firmware Analysis and Comparison Tool 1,242 7 days ago
Binwalk-v3 11,276 9 days ago
fwhunt-scanner-Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules 214 3 months ago
Qiling 5,158 about 1 month ago
fwanalyzer 492 about 1 year ago
ByteSweep
Firmwalker 1,057 about 1 year ago
Checksec.sh 2,026 24 days ago
QEMU
Firmadyne 1,830 4 months ago
Firmware Modification Kit
Firmware analysis and reversing
Reversing 101
IoT Security Verification Standard (ISVS) 134 almost 2 years ago
OWASP Firmware Security Testing Methodology
Firmware emulation with QEMU
Reversing ESP8266 Firmware
Emulating ARM Router Firmware
Reversing Firmware With Radare
Samsung Firmware Magic - Unpacking and Decrypting 210 over 3 years ago
Qiling & Binary Emulation for automatic unpacking
Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
Simulating and hunting firmware vulnerabilities with Qiling
Using Symbolic Execution to Detect UEFI Firmware Vulnerabilities
Binarly Finds Six High Severity Firmware Vulnerabilities in HP Enterprise Devices
Emulating and Exploiting UEFI Firmware
IoT binary analysis & emulation part -1
ross debugging for ARM / MIPS ELF with QEMU/toolchain
Qemu + buildroot 101
Emulating IoT Firmware Made Easy: Start Hacking Without the Physical Device
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
Debugging D-Link: Emulating firmware and hacking hardware

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Firmware samples to pentest

Download From here by firmware.center

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Binary Analysis

Reverse Engineering For Everyone!
https://www.coalfire.com/the-coalfire-blog/reverse-engineering-and-patching-with-ghidra
Part two: Reverse engineering and patching with Ghidra
Automating binary vulnerability discovery with Ghidra and Semgrep
Zip Slip Vulnerability

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Secureboot

Writing a Bootloader
Pwn the ESP32 Secure Boot
Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction
Amlogic S905 SoC: bypassing the (not so) Secure Boot to dump the BootROM /
Defeating Secure Boot with Symlink Attacks
PS4 Aux Hax 5 & PSVR Secure Boot Hacking with Keys by Fail0verflow!
Eclypsium Discovers Multiple Vulnerabilities Affecting 129 Dell Models Via Dell Remote OS Recovery And Firmware Update Capabilities
Technical Advisory โ€“ U-Boot โ€“ Unchecked Download Size and Direction in USB DFU (CVE-2022-2347)
Breaking Secure Boot on the Silicon Labs Gecko platform

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Storage Medium

EMMC Protocol
RPMB, a secret place inside the eMMC
Hardware Hacking 101: Identifying And Dumping EMMC Flash
EMMC Data Recovery From Damaged Smartphone
Another Bunch Of Articles For EMMC
Unleash Your Smart-Home Devices: Vacuum Cleaning Robot Hacking
Hands-On IoT Hacking: Rapid7 At DEF CON 30 IoT Village, Part 1

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Payment Device Security

Introduction to ATM Penetration Testing
Pwning ATMs For Fun and Profit
Jackpotting Automated Teller Machines Redux By Barnaby Jack

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / IoT hardware Overview and Hacking

IoT Hardware Guide
Intro To Hardware Hacking - Dumping Your First Firmware
Bus Pirate
EEPROM reader/SOIC Cable
Jtagulator/Jtagenum
Logic Analyzer
The Shikra
FaceDancer21 (USB Emulator/USB Fuzzer)
RfCat
Hak5Gear- Hak5FieldKits
Ultra-Mini Bluetooth CSR 4.0 USB Dongle Adapter
Attify Badge - UART, JTAG, SPI, I2C (w/ headers)
An Introduction to Hardware Hacking
Serial Terminal Basics
Reverse Engineering Serial Ports
REVERSE ENGINEERING ARCHITECTURE AND PINOUT OF CUSTOM ASICS
ChipWhisperer - Hardware attacks
Hardware hacking tutorial: Dumping and reversing firmware
Dumping the firmware From Router using BUSPIRATE - SPI Dump
TPM 2.0: Extracting Bitlocker keys through SPI
How to Flash Chip of a Router With a Programmer
Extracting Flash Memory over SPI
Extracting Firmware from Embedded Devices (SPI NOR Flash)
SPI-Blogs
Reading FlashROMS - Youtube
Intro to Embedded RE: UART Discovery and Firmware Extraction via UBoot
Router Analysis Part 1: UART Discovery and SPI Flash Extraction
Identifying UART interface
onewire-over-uart 153 over 7 years ago
Accessing sensor via UART
Using UART to connect to a chinese IP cam
A journey into IoT โ€“ Hardware hacking: UART
UARTBruteForcer 16 almost 9 years ago
UART Connections and Dynamic analysis on Linksys e1000
Accessing and Dumping Firmware Through UART
UART Exploiter 5 over 1 year ago
HARDWARE HACKING 101: INTRODUCTION TO JTAG
How To Find The JTAG Interface - Hardware Hacking Tutorial
Buspirate JTAG Connections - Openocd
Extracting Firmware from External Memory via JTAG
Analyzing JTAG
The hitchhackerโ€™s guide to iPhone Lightning & JTAG hacking
Debugging 8-bit AVRยฎ microcontrollers trhough JTAG and AVR-gdb
Introduction to TPM (Trusted Platform Module)
Trusted platform module security defeated in 30 minutes, no soldering required
Side channel attacks
Attacks on Implementations of Secure Systems 225 3 months ago
fuzzing, binary analysis, IoT security, and general exploitation 1,234 18 days ago
Espressif ESP32: Bypassing Encrypted Secure Boot(CVE-2020-13629)
Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)
Researchers use Rowhammer bit flips to steal 2048-bit crypto key

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Awesome IoT Pentesting Guides

Shodan Pentesting Guide
Car Hacking Practical Guide 101
OWASP Firmware Security Testing Methodology
Awesome-bluetooth-security 518 12 months ago
awesome-embedded-fuzzing 34 over 2 years ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Fuzzing Things

OWASP Fuzzing Info
Fuzzing_ICS_protocols
Fuzzowski - the Network Protocol Fuzzer that we will want to use
Fuzz Testing of Application Reliability
FIRM-AFL : High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation
Snipuzz : Black-box Fuzzing of IoT Firmware via Message Snippet Inference
part1 [fuzzing-iot-binaries] - /
Modern Vulnerability Research Techniques on Embedded Systems
FuzzingPaper 2,467 about 1 month ago
Exercises to learn how to fuzz with American Fuzzy Lop 1,227 about 2 years ago
Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging 436 10 months ago
Bluetooth experimentation framework for Broadcom and Cypress chips. 687 3 months ago
Fuzzing Forum 3,513 29 days ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / FlipperZero

Flipper Zero Unleashed Firmware 17,564 11 days ago
RogueMaster Flipper Zero Firmware 5,314 7 days ago
Exploiting Flipper Zeroโ€™s NFC file loader CVE-2022-40363:
Flipper Zero - Starter Guide (YouTube)
Awesome Resources for Flipper Zero 18,960 about 2 months ago
Gaylord M FOCker - Pwn MIFARE Tags

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / ICS

ICS-Security 2,726 about 1 month ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Automotive

Automotive-Security 2,726 about 1 month ago

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Vulnerable IoT and Hardware Applications

DVID 188 9 months ago IoT: -
Damn Vulnerable Safe Safe: -
IoT-vulhub IoT-vulhub: -
DVRF 673 over 3 years ago Router: -
Damn Vulnerable Chemical Process SCADA: -
Sticky Fingers DV-Pi PI: -
Damn Vulnerable SS7 Network SS7 Network: -
Hacklab VulnVoIP VoIP: -
Hardware Hacking 101 46 over 5 years ago Hardware Hacking 101: -
RHme-2015 0 3 months ago RHME-2015: -
Rhme-2016 2 3 months ago RHME-2016: -
Rhme-2017 0 3 months ago RHME-2017: -

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / CTF For IoT And Embeddded

BLE CTF 673 3 months ago A framework focused on Bluetooth Low Energy security
Rhme-2016 2 3 months ago Riscure's hardware security competition for 2016
Rhme-2017 0 3 months ago Riscure's hardware security competition for 2017
IoTGoat 180 over 4 years ago Deliberately insecure firmware based on OpenWrt for IoT security training
IoT Village CTF A Capture The Flag event specifically focused on IoT security
IoTSec CTF Offers IoT related challenges for continuous learning
Emulate to Exploitate
Damn Vulnerable ARM Router A deliberately vulnerable ARM router for exploitation practice
Firmware Security Training & CTF Firmware analysis tools and challenges by Router Analysis Toolkit
ARM-X CTF 692 11 days ago A set of challenges focused on ARM exploitation
Azeria Labs ARM Challenges Offers ARM assembly challenges and tutorials
Microcorruption Embedded security CTF focusing on lock systems
Pwnable.kr Offers various reverse engineering challenges
Hack The Box Platform offering a range of challenges, including hardware and reverse engineering
Root Me Platform with various types of challenges including hardware and reverse engineering
CTFtime Lists various CTFs, including those in hardware, IoT, and firmware

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / follow the people

Jilles
Joe Fitz
Aseem Jakhar
Cybergibbons
Jasper
Dave Jones
bunnie
Ilya Shaposhnikov
Mark C.
A-a-ron Guzman
Yashin Mehaboobe
Arun Magesh
Mr-IoT
QKaiser
9lyph

๐Ÿ› ๏ธ Approach Methodology / Specific Topics in IoT Security / Blogs for IoT Pentest

wrongbaud
Firmware Analysis
voidstarsec
Exploitee.rs Website
Jilles.com
Syss Tech Blog
Payatu Blog
Raelize Blog
JCJC Dev Blog
W00tsec Blog
Devttys0 Blog (Use Wayback Machine for old blogs)
Wrongbaud Blog
Embedded Bits Blog
RTL-SDR Blog
Keenlab Blog
Courk.cc
IoT Security Wiki
Cybergibbons Blog
Firmware.RE
K3170makan Blog
Tclaverie Blog
Besimaltinok Blog
Ctrlu Blog
IoT Pentest Blog
Duo Decipher Blog
Sp3ctr3 Blog
0x42424242.in Blog
Dantheiotman Blog
Danman Blog
Quentinkaiser Blog
Quarkslab Blog
Ice9 Blog
F-Secure Labs Blog
MG.lol Blog
CJHackerz Blog
Bunnie's Blog
Synacktiv Publications
Cr4.sh Blog
Ktln2 Blog
Naehrdine Blog
Limited Results Blog
Fail0verflow Blog
Exploit Security Blog
Attify Blog