Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
IoTSecurity101
A Curated list of IoT Security Resources
https://github.com/V33RU/IoTSecurity101
- 🏢 ***IoT Lab Setup Guide for Corporate/Individual***
- Subaru Head Unit Jailbreak
- Jeep Hack
- Dropcam Hacking
- Printer Hacking Live Sessions - Gamozo Labs
- LED Light Hacking
- PS4 Jailbreak – the current status
- Your Lenovo Watch X Is Watching You & Sharing What It Learns
- Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT
- Besder 6024PB-XMA501 IP camera security analysis
- Smart Lock Vulnerabilities
- IoT-Vuln-with CVE and PoC of tenda and dlink
- IoTSecurity101 Telegram
- IoTSecurity101 Reddit
- IoTSecurity101 Discord
- Hardware Hacking Telegram
- RFID Discord Group
- ICS Discord Group
- opensecuritytraining 2
- The Firmware Handbook (Embedded Technology) 1st Edition by Jack Ganssle
- Hardware Hacking: Have Fun while Voiding your Warranty 1st Edition
- Linksys WRT54G Ultimate Hacking 1st Edition by Paul Asadoorian
- Hacking the Xbox - An Introduction to Reverse Engineering HACKING THE XBOX by Andrew “bunnie” Huang
- Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure by Eric D. Knapp , Raj Samani
- Android Hacker's Handbook by Joshua J. Drake
- The Art of Pcb Reverse Engineering: Unravelling the Beauty of the Original Design
- Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts 1st Edition, by Nitesh Dhanjani
- Learning Linux Binary Analysis By Ryan "elfmaster" O'Neill
- Car hacker's handbook by Craig Smith
- IoT Penetration Testing Cookbook By Aaron Guzman , Aditya Gupta
- Inside Radio: An Attack and Defense Guide by Authors: Yang, Qing, Huang, Lin
- Pentest Hardware
- Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition 5th Edition by Daniel Regalado , Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness , Branko Spasojevic , Ryan Linn , Stephen Sims
- Practical Hardware Pentesting
- The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Front Cover Jasper van Woudenberg, Colin O'Flynn
- Practical IoT Hacking-The Definitive Guide to Attacking the Internet of Things by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
- Manual PCB-RE: The Essentials
- PatrIoT: practical and agile threat research for IoT by Emre SĂĽren
- Practical Hardware Pentesting - Second Edition
- Blue Fox: Arm Assembly Internals & Reverse Engineering
- Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
- Hardware Security Training, Hands-on!
- Automotive Cybersecurity Engineering Handbook: The automotive engineer's roadmap to cyber-resilient vehicles Series
- Embedded Systems Security and TrustZone
- Microcontroller Exploits
- Metasploit, 2nd Edition
- Engineering Secure Devices
- Hardware Hacking cheat sheet
- Nmap
- Shodan
- Censys
- ZoomEye
- BinaryEdge
- Thingful
- Wigle
- Hunter.io
- BuiltWith
- NetDB
- Recon-ng
- PublicWWW
- Joe Grand
- Liveoverflow
- Binary Adventure
- EEVBlog
- Craig Smith
- iotsecurity101
- Besim ALTINOK - IoT - Hardware - Wireless
- Ghidra Ninja
- Cyber Gibbons
- Scanline
- Aaron Christophel
- Valerio Di Giampietro
- Reflecting upon OWASP TOP-10 IoT Vulnerabilities
- OWASP IoT Top 10 2018 Mapping Project
- Hardware toolkits for IoT security analysis
- Webthings by Mozilla - RaspberryPi
- Sigint OS- LTE IMSI Catcher
- Instatn-gnuradio OS - For Radio Signals Testing
- Ubutnu Best Host Linux for IoT's - Use LTS
- Internet of Things - Penetration Testing OS v1
- Dragon OS - DEBIAN LINUX WITH PREINSTALLED OPEN SOURCE SDR SOFTWARE
- EmbedOS - Embedded security testing virtual machine
- Skywave Linux- Software Defined Radio for Global Online Listening
- A Small, Scalable Open Source RTOS for IoT Embedded Devices
- ICS - Controlthings.io
- AttifyOS - IoT Pentest OS - by Aditya Gupta
- Expliot - IoT Exploitation framework - by Aseemjakhar
- Routersploit (Exploitation Framework for Embedded Devices)
- IoTSecFuzz (comprehensive testing for IoT device)
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices
- killerbee - Zigbee exploitation
- PRET - Printer Exploitation Toolkit
- HAL – The Hardware Analyzer
- FwAnalyzer (Firmware Analyzer)
- ISF(Industrial Security Exploitation Framework
- PENIOT: Penetration Testing Tool for IoT
- MQTT-PWN
- IDA Pro
- GDB
- Radare2 - source framework for reverse engineering and analyzing binaries; includes a disassembler for multiple architectures.
- Cutter - friendly interface as well as additional features.
- Ghidra
- Binary Ninja
- OllyDbg
- x64dbg - source x64/x32 debugger for windows with a focus on plugin support and scriptability.
- Hopper
- Immunity Debugger
- PEiD
- Introduction to IoT
- IoT Architecture
- IoT attack surface
- IoT Protocols Overview
- Introduction to MQTT
- MQTT Broker Security - 101
- Hacking the IoT with MQTT
- Are Smart Homes Vulnerable to Hacking?
- Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)
- Eclipse Mosquitto MQTT broker 2.0.9 - 'mosquitto' Unquoted Service Path
- IoT Security: RCE in MQTT Protocol
- Penetration testing of Sesame Smart door lock
- CVE-2020-13849
- CVE-2023-3028
- CVE-2021-0229
- CVE-2019-5432
- Using IoT MQTT for V2V and Connected Car
- MQTT with Hardware Development Information
- IoT Live Demo: 100,000 Connected Cars with Kubernetes, Kafka, MQTT, TensorFlow
- Nmap MQTT Library
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to Send Push Notifications (Video)
- Understanding the MQTT Protocol Packet Structure
- Authenticating & Authorizing Devices Using MQTT with Auth0
- Deep Learning UDF for MQTT IoT Sensor Data Anomaly Detection
- IoXY - MQTT Intercepting Proxy
- Mosquitto - An Open Source MQTT Broker
- HiveMQ
- MQTT Explorer
- Welcome to MQTT-PWN!
- WailingCrab Malware Evolves Using MQTT for Stealthier C2 Communication
- Alert: New WailingCrab Malware Loader
- MQTT on Snapcraft
- Introduction
- CoAP client Tools
- CoAP Pentest Tools
- Nmap - NSE for coap
- Complete course in Software Defined Radio (SDR) by Michael Ossmann
- SDR Notes - Radio IoT Protocols Overview
- Understanding Radio
- Introduction to Software Defined Radio
- Introduction Gnuradio companion
- Creating a flow graph in gunradiocompanion
- Analysing radio signals 433Mhz
- Recording specific radio signal
- Replay Attacks with raspberrypi -rpitx
- Awesome-Cellular-Hacking
- what is base tranceiver station
- How to Build Your Own Rogue GSM BTS
- 5Ghoul - 5G NR Attacks & 5G OTA Fuzzing
- Introduction to GSM Security
- GSM Security 2
- vulnerabilities in GSM security with USRP B200
- Security Testing 4G (LTE) Networks
- Case Study of SS7/SIGTRAN Assessment
- Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP
- ss7MAPer – A SS7 pen testing toolkit
- Introduction to SIGTRAN and SIGTRAN Licensing
- SS7 Network Architecture
- Introduction to SS7 Signaling
- Breaking LTE on Layer Two
- LTE Sniffer
- Fake BTS Detector (SCL-8521)
- List of RFID/NFC Security & Privacy talks
- Introduction and protocol Overview
- Hacking Zigbee Devices with Attify Zigbee Framework
- Hands-on with RZUSBstick
- ZigBee & Z-Wave Security Brief
- Hacking ZigBee Networks
- Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes
- Security Analysis of Zigbee Networks with Zigator and GNU Radio
- Low-Cost ZigBee Selective Jamming
- zigbear
- ZigDiggity
- Zigator
- Z3sec
- APIMOTE IEEE 802.15.4/ZIGBEE SNIFFING HARDWARE
- RaspBee-The Raspberry Pi Zigbee gateway
- USRP SDR 2
- ATUSB IEEE 802.15.4 USB Adapter
- nRF52840-Dongle
- awesome-bluetooth-security
- BLE-NullBlr: Step By Step guide to BLE Understanding and Exploiting
- Traffic Engineering in a Bluetooth Piconet (PDF)
- BLE Characteristics: A Beginner's Tutorial
- Bluing - An intelligence gathering tool for hacking Bluetooth
- btproxy
- hcitool & bluez
- Testing With GATT Tool
- crackle - Cracking encryption
- bettercap
- BtleJuice Bluetooth Smart Man-in-the-Middle framework
- gattacker
- BTLEjack Bluetooth Low Energy Swiss army knife
- DEDSEC-Bluetooth-exploit
- BrakTooth Proof of Concept-Blutooth Classic Attacks
- sweyntooth_bluetooth_low_energy_attacks Public
- esp32_bluetooth_classic_sniffer Public
- NRFCONNECT - 52840
- EDIMAX
- CSR 4.0
- ESP32 - Development and learning Bluetooth
- Ubertooth
- Sena 100
- ESP-WROVER-KIT-VB
- Blue2thprinting: Answering the Question of 'WTF am I even looking at?!'
- Open Wounds: The Last 5 Years Have Left Bluetooth to Bleed
- It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic...
- Bluetooth vs BLE Basics
- Examining the August Smart Lock
- Finding Bugs in Bluetooth
- Intel Edison as Bluetooth LE — Exploit Box
- How I Reverse Engineered and Exploited a Smart Massager
- My Journey Towards Reverse Engineering a Smart Band — Bluetooth-LE RE
- Bluetooth Smartlocks
- I Hacked MiBand 3
- GATTacking Bluetooth Smart Devices
- Bluetooth Beacon Vulnerability
- Sweyntooth Vulnerabilities
- AIRDROP_LEAK - Sniffs BLE Traffic and Displays Status Messages from Apple Devices
- BRAKTOOTH: Causing Havoc on Bluetooth Link Manager
- Practical Introduction to BLE GATT Reverse Engineering: Hacking the Domyos EL500
- MojoBox - Yet Another Not So Smartlock
- Bluetooth-Hacking
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023
- Real Time Interception And Monitoring Of A DECT Cordless Telephone
- Eavesdropping On Unencrypted DECT Voice Traffic
- Decoding DECT Voice Traffic: In-depth Explanation
- Android App Reverse Engineering 101 - A comprehensive guide to reverse engineering Android applications.
- Android Application Pentesting Book - A detailed book on penetration testing techniques for Android devices.
- Android Pentest Video Course - TutorialsPoint - A series of video tutorials on Android penetration testing.
- Android Tamer - A Virtual/Live Platform for Android Security professionals, offering tools and environment for Android security.
- iOS Pentesting - A guide to penetration testing in iOS environments.
- OWASP Mobile Security Testing Guide - The Open Web Application Security Project's guide for mobile security testing, applicable to iOS.
- Payment Villages
- ICS Village
- IoT Villages
- RF hackers
- Car Hacking Village
- AZM Online Arm Assembler by Azeria
- Online Disassembler
- Compiler Explorer is an interactive online compiler which shows the assembly output of compiled C++, Rust, Go
- Azeria Labs
- ARM EXPLOITATION FOR IoT
- Damn Vulnerable ARM Router (DVAR)
- EXPLOIT.EDUCATION
- EMBA-An analyzer for embedded Linux firmware
- FACT-Firmware Analysis and Comparison Tool
- Binwalk
- fwhunt-scanner-Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules
- Qiling
- fwanalyzer
- ByteSweep
- Firmwalker
- Checksec.sh
- QEMU
- Firmadyne
- Firmware Modification Kit
- Firmware analysis and reversing
- Reversing 101
- IoT Security Verification Standard (ISVS)
- OWASP Firmware Security Testing Methodology
- Firmware emulation with QEMU
- Reversing ESP8266 Firmware
- Emulating ARM Router Firmware
- Reversing Firmware With Radare
- Samsung Firmware Magic - Unpacking and Decrypting
- Qiling & Binary Emulation for automatic unpacking
- Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
- Simulating and hunting firmware vulnerabilities with Qiling
- Using Symbolic Execution to Detect UEFI Firmware Vulnerabilities
- Binarly Finds Six High Severity Firmware Vulnerabilities in HP Enterprise Devices
- Emulating and Exploiting UEFI Firmware
- IoT binary analysis & emulation part -1
- ross debugging for ARM / MIPS ELF with QEMU/toolchain
- Qemu + buildroot 101
- Emulating IoT Firmware Made Easy: Start Hacking Without the Physical Device
- Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
- Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
- Debugging D-Link: Emulating firmware and hacking hardware
- Download From here by firmware.center
- Reverse Engineering For Everyone!
- https://www.coalfire.com/the-coalfire-blog/reverse-engineering-and-patching-with-ghidra
- Part two: Reverse engineering and patching with Ghidra
- Automating binary vulnerability discovery with Ghidra and Semgrep
- Zip Slip Vulnerability
- Writing a Bootloader
- Pwn the ESP32 Secure Boot
- Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction
- Amlogic S905 SoC: bypassing the (not so) Secure Boot to dump the BootROM - software.com/2016/10/06/hacking-arm-trustzone-secure-boot-on-amlogic-s905-soc/)
- Defeating Secure Boot with Symlink Attacks
- PS4 Aux Hax 5 & PSVR Secure Boot Hacking with Keys by Fail0verflow!
- Eclypsium Discovers Multiple Vulnerabilities Affecting 129 Dell Models Via Dell Remote OS Recovery And Firmware Update Capabilities
- Technical Advisory – U-Boot – Unchecked Download Size and Direction in USB DFU (CVE-2022-2347)
- Breaking Secure Boot on the Silicon Labs Gecko platform
- EMMC Protocol
- RPMB, a secret place inside the eMMC
- Hardware Hacking 101: Identifying And Dumping EMMC Flash
- EMMC Data Recovery From Damaged Smartphone
- Another Bunch Of Articles For EMMC
- Unleash Your Smart-Home Devices: Vacuum Cleaning Robot Hacking
- Hands-On IoT Hacking: Rapid7 At DEF CON 30 IoT Village, Part 1
- Introduction to ATM Penetration Testing
- Pwning ATMs For Fun and Profit
- Jackpotting Automated Teller Machines Redux
- IoT Hardware Guide
- Intro To Hardware Hacking - Dumping Your First Firmware
- Bus Pirate
- EEPROM reader/SOIC Cable
- Jtagulator/Jtagenum
- Logic Analyzer
- The Shikra
- FaceDancer21 (USB Emulator/USB Fuzzer)
- RfCat
- Hak5Gear- Hak5FieldKits
- Ultra-Mini Bluetooth CSR 4.0 USB Dongle Adapter
- Attify Badge - UART, JTAG, SPI, I2C (w/ headers)
- An Introduction to Hardware Hacking
- Serial Terminal Basics
- Reverse Engineering Serial Ports
- REVERSE ENGINEERING ARCHITECTURE AND PINOUT OF CUSTOM ASICS
- ChipWhisperer - Hardware attacks
- Hardware hacking tutorial: Dumping and reversing firmware
- Dumping the firmware From Router using BUSPIRATE - SPI Dump
- TPM 2.0: Extracting Bitlocker keys through SPI
- How to Flash Chip of a Router With a Programmer
- Extracting Flash Memory over SPI
- Extracting Firmware from Embedded Devices (SPI NOR Flash)
- SPI-Blogs
- Reading FlashROMS - Youtube
- Intro to Embedded RE: UART Discovery and Firmware Extraction via UBoot
- Router Analysis Part 1: UART Discovery and SPI Flash Extraction
- Identifying UART interface
- onewire-over-uart
- Accessing sensor via UART
- Using UART to connect to a chinese IP cam
- A journey into IoT – Hardware hacking: UART
- UARTBruteForcer
- UART Connections and Dynamic analysis on Linksys e1000
- Accessing and Dumping Firmware Through UART
- UART Exploiter
- HARDWARE HACKING 101: INTRODUCTION TO JTAG
- How To Find The JTAG Interface - Hardware Hacking Tutorial
- Buspirate JTAG Connections - Openocd
- Extracting Firmware from External Memory via JTAG
- Analyzing JTAG
- The hitchhacker’s guide to iPhone Lightning & JTAG hacking
- Debugging 8-bit AVR® microcontrollers trhough JTAG and AVR-gdb
- Introduction to TPM (Trusted Platform Module)
- Trusted platform module security defeated in 30 minutes, no soldering required
- Side channel attacks
- Attacks on Implementations of Secure Systems
- fuzzing, binary analysis, IoT security, and general exploitation
- Espressif ESP32: Bypassing Encrypted Secure Boot(CVE-2020-13629)
- Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)
- Researchers use Rowhammer bit flips to steal 2048-bit crypto key
- NAND Glitching Attack - Gaining root access to a Wink Hub through NAND glitching.
- Tutorial CW305-4 Voltage Glitching with Crowbars - Detailed tutorial on voltage glitching using crowbars.
- Voltage Glitching Attack using SySS iCEstick Glitcher - A demonstration of a voltage glitching attack by SySS PentestTV.
- Samy Kamkar - FPGA Glitching & Side Channel Attacks - Insights on FPGA glitching and side channel attacks from Samy Kamkar.
- Hardware Power Glitch Attack - rhme2 Fiesta (FI 100) - A hardware power glitch attack demonstration by LiveOverflow.
- Keys in flash - Glitching AES keys from an Arduino / ATmega - Extracting AES keys from an Arduino using glitching.
- Implementing Practical Electrical Glitching Attacks - A guide on implementing electrical glitching attacks, presented at Black Hat Europe 2015.
- How To Voltage Fault Injection - A comprehensive guide on voltage fault injection techniques.
- Shodan Pentesting Guide
- Car Hacking Practical Guide 101
- Awesome-bluetooth-security
- awesome-embedded-fuzzing
- OWASP Fuzzing Info
- Fuzzing_ICS_protocols
- Fuzzowski - the Network Protocol Fuzzer that we will want to use
- Fuzz Testing of Application Reliability
- FIRM-AFL : High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation
- Snipuzz : Black-box Fuzzing of IoT Firmware via Message Snippet Inference
- fuzzing-iot-binaries - iot-binaries-with-afl-part-ii/)
- Modern Vulnerability Research Techniques on Embedded Systems
- FuzzingPaper
- Exercises to learn how to fuzz with American Fuzzy Lop
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging
- Bluetooth experimentation framework for Broadcom and Cypress chips.
- Fuzzing Forum
- Flipper Zero Unleashed Firmware
- RogueMaster Flipper Zero Firmware
- Exploiting Flipper Zero’s NFC file loader
- Flipper Zero - Starter Guide (YouTube)
- Awesome Resources for Flipper Zero
- Gaylord M FOCker - Pwn MIFARE Tags
- DVID - `Deliberately vulnerable IoT device firmware for training and educational purposes.`
- Damn Vulnerable Safe - `A physical safe designed to be vulnerable, intended for security training.`
- IoT-vulhub - `Collection of Dockerized vulnerable IoT applications for learning about IoT security.`
- DVRF - `Damn Vulnerable Router Firmware project for understanding router vulnerabilities.`
- Damn Vulnerable Chemical Process - `A presentation on a vulnerable SCADA system for learning purposes.`
- Sticky Fingers DV-Pi - `A vulnerable Raspberry Pi project for educational use.`
- Damn Vulnerable SS7 Network - `Demonstrates vulnerabilities in SS7 networks.`
- Hacklab VulnVoIP - `A vulnerable VoIP application for learning and training.`
- Hardware Hacking 101 - `A repository for learning the basics of hardware hacking.`
- RHme-2015 - `Archive of the RHme-2015 hardware hacking competition.`
- Rhme-2016 - `Archive of the RHme-2016 hardware hacking competition.`
- Rhme-2017 - `Archive of the RHme-2017 hardware hacking competition.`
- BLE CTF - A framework focused on Bluetooth Low Energy security.
- Rhme-2016 - Riscure's hardware security competition for 2016.
- Rhme-2017 - Riscure's hardware security competition for 2017.
- IoTGoat - Deliberately insecure firmware based on OpenWrt for IoT security training.
- IoT Village CTF - A Capture The Flag event specifically focused on IoT security.
- IoTSec CTF - Offers IoT related challenges for continuous learning.
- Damn Vulnerable ARM Router - A deliberately vulnerable ARM router for exploitation practice.
- Firmware Security Training & CTF - Firmware analysis tools and challenges by Router Analysis Toolkit.
- ARM-X CTF - A set of challenges focused on ARM exploitation.
- Azeria Labs ARM Challenges - Offers ARM assembly challenges and tutorials.
- Microcorruption - Embedded security CTF focusing on lock systems.
- Pwnable.kr - Offers various reverse engineering challenges.
- Hack The Box - Platform offering a range of challenges, including hardware and reverse engineering.
- Root Me - Platform with various types of challenges including hardware and reverse engineering.
- CTFtime - Lists various CTFs, including those in hardware, IoT, and firmware.
- Jilles
- Joe Fitz
- Aseem Jakhar
- Cybergibbons
- Jasper
- Dave Jones
- bunnie
- Ilya Shaposhnikov
- Mark C.
- A-a-ron Guzman
- Yashin Mehaboobe
- Arun Magesh
- Mr-IoT
- QKaiser
- 9lyph
- wrongbaud
- Firmware Analysis
- **voidstarsec**
- **Exploitee.rs Website**
- **Jilles.com**
- **Syss Tech Blog**
- **Payatu Blog**
- **Raelize Blog**
- **JCJC Dev Blog**
- **W00tsec Blog**
- **Devttys0 Blog**
- **Wrongbaud Blog**
- **Embedded Bits Blog**
- **RTL-SDR Blog**
- **Keenlab Blog**
- **Courk.cc**
- **IoT Security Wiki**
- **Cybergibbons Blog**
- **Firmware.RE**
- **K3170makan Blog**
- **Tclaverie Blog**
- **Besimaltinok Blog**
- **Ctrlu Blog**
- **IoT Pentest Blog**
- **Duo Decipher Blog**
- **Sp3ctr3 Blog**
- **0x42424242.in Blog**
- **Dantheiotman Blog**
- **Danman Blog**
- **Quentinkaiser Blog**
- **Quarkslab Blog**
- **Ice9 Blog**
- **F-Secure Labs Blog**
- **MG.lol Blog**
- **CJHackerz Blog**
- **Bunnie's Blog**
- **Synacktiv Publications**
- **Cr4.sh Blog**
- **Ktln2 Blog**
- **Naehrdine Blog**
- **Limited Results Blog**
- **Fail0verflow Blog**
- **Exploit Security Blog**
- **Attify Blog**
Keywords
security
10
iot
7
python
5
security-tools
5
hacking
5
ble
4
hardware
4
iot-security
3
mqtt
3
penetration-testing
3
reverse-engineering
3
bluetooth
3
embedded
3
zigbee
2
sdr
2
firmware
2
firmware-analysis
2
firmware-tools
2
security-automation
2
pentesting
2
exploitation
2
bluetooth-hacking
2
android
2
bluetooth-classic
2
br-edr
2
scanner
2
analysis
2
nmap
2
sniffer
2
reconnaissance
2
spoofing
2
uefi
2
confluent-platform
1
embedded-security
1
fpga
1
hal
1
confluent
1
mqtt-client
1
mqtt-broker
1
security-attacks
1
integrated-circuits
1
netlist
1
python2-7
1
penetration-testing-tools
1
penetration-testing-framework
1
ics-exp
1
ics-poc
1
isf
1
iot-hacking
1
plc-injecter
1