Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-IoT-security-article
Collect some iot-related security articles, including vulnerability analysis, security conferences and papers, etc.
https://github.com/H4lo/awesome-IoT-security-article
Last synced: 4 days ago
JSON representation
-
网络设备漏洞分析
- SonicWall SMA100 Stored XSS to RCE
- TPLink 中继器设备命令注入漏洞分析及复现
- Juniper SRX远程代码执行漏洞复现分析
- Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400)
- Uniview IPC2322LB Auth Bypass and CLI escape
- Hunting for <del>Un</del>authenticated n-days in Asus Routers
- Palo Alto CVE-2024-3400 漏洞分析
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- CVE-2024-22058 Ivanti Landesk LPE
- Patch diff an old vulnerability in Synology NAS | cq674350529's blog
- RCE in Avaya Aura Device Services – Assetnote
- CVE-2023-22374: F5 BIG-IP Format String Vulnerability | Rapid7 Blog
- Vulnerability Spotlight: Asus router access, information disclosure, denial of service vulnerabilities discovered
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- CVE-2022-45313: Mikrotik RouterOs flaw can lead to execute arbitrary code
- Cool vulns don't live long - Netgear and Pwn2Own
- Horde Webmail - Remote Code Execution via Email
- From Patch To Exploit: CVE-2021-35029
- SSD Advisory – NETGEAR DGND3700v2 PreAuth Root Access - SSD Secure Disclosure
- Reverse Engineering a Netgear Nday | StarkeBlog
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- [CVE-2024-40617
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- Remote Code Execution on Cisco Access Point WAP371 firmware ⤠1.3.0.7
- CVE-2023-46805 | AttackerKB
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- Ivanti's Pulse Connect Secure Auth Bypass Round Two
- NETGEAR Routers: A Playground for Hackers? | NCC Group Research Blog | Making the world safer and more secure
- Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) - Blog - VulnCheck
- Zero Day Initiative — CVE-2022-29844: A Classic Buffer Overflow on the Western Digital My Cloud Pro Series PR4100
- 奇安信攻防社区-CVE-2023-25690 Apache HTTP Server 请求走私漏洞 分析与利用
- Netgear Nighthawk r7000p upnpd Buffer Overflow Remote Code Execution Vulnerability
- CVE-2023-0669 | AttackerKB
- The Last Breath of Our Netgear RAX30 Bugs - A Tragic Tale before Pwn2Own Toronto 2022 | STAR Labs
- Unauthenticated Remote Code Execution in a Wide Range of DrayTek Vigor Routers
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- Blind exploits to rule WatchGuard firewalls
- Netgear Nighthawk r7000p aws_json Unauthenticated Double Stack Overflow Vulnerability
- Relyze Software Limited - Advanced Software Analysis: CVE-2022-27643 - NETGEAR R6700v3 upnpd Buffer Overflow Remote Code Execution Vulnerability
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- Cisco IOS XE CVE-2023-20198: Deep Dive and POC – Horizon3.ai
- Yet More Unauth Remote Command Execution Vulns in Firewalls - Sangfor Edition
- 记一次全设备通杀未授权 RCE 的挖掘经历
- Vulnerability Spotlight: Netgear Orbi router vulnerable to arbitrary command execution
- Debugging D-Link: Emulating firmware and hacking hardware
- Puckungfu: A NETGEAR WAN Command Injection – NCC Group Research
- Citrix CVE-2022-27518 漏洞分析
- Analyzing an Old Netatalk dsi_writeinit Buffer Overflow Vulnerability in NETGEAR Router | cq674350529's blog
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- High Signal Detection and Exploitation of Ivanti's Pulse Connect Secure Auth Bypass & RCE
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- Introduction
- Hacking a Secure Industrial Remote Access Gateway
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- MicroSocks: Convenient access through a compromised SonicWall SMA | dfir.ch
- Draytek Vigor 3910 | CataLpa's Site
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- CVE/CVE-2024-33788 at main · ymkyu/CVE
- 思科企业级路由器0day漏洞挖掘
- OOB Memory Read: Netscaler ADC and Gateway
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- directory-ttraversal-vulnerability-in-huawei-hg255s-products
- Kerio Mailbox Takeover
- Pwn2Own: Pivoting from WAN to LAN to Attack a Synology BC500 IP Camera, Part 2
-
嵌入式/物联网设备漏洞分析
- Intel BMC firmware lighttpd vulnerability
- 搭建 FortiGate 调试环境 (二)
- 某路由器串口破解新思路
- 原创 Paper | 从 0 开始学习 VxWorks
- 技术前瞻|mqtt攻击面和挖掘思路浅析
- advisories/HNS-2024-05-rt-thread.txt at master · 0xdea/advisories
- (Research) Exploiting HTTP Parsers Inconsistencies
- IOTsec-Zoneç©èç½å®å ¨ç¤¾åº
- KUKA KR C4 | CISA
- DJI Mavic 3 Drone Firmware Analysis
- 2020补天杯复盘:小米小爱音箱 后渗透利用公开 | Clang裁缝店
- 一种获取 FortiOS 权限的方法 | CataLpa's Home
- Firmware key extraction by gaining EL3 - The Cave
- Dmitry.GR: Projects
- Reverse Engineering BLE Devices — Reverse Engineering BLE Devices documentation
- LinkSys EA6100 AC1200 - Part 1 - PCB reversing
- DualShock4 Reverse Engineering - Part 1
- Shielder - Reversing embedded device bootloader (U-Boot) - p.1
- Zyxel firmware extraction and password analysis - hn security
- Hacking Bluetooth to Brew Coffee from GitHub Actions: Part 1 - Bluetooth Investigation | grack
- Intro to Embedded RE Part 1: Tools and Series Overview
- Reverse engineering an EV charger
- I'm Building a Self-Destructing USB Drive - Interrupt Labs Blog
- PCIe DMA Attack against a secured Jetson Nano (CVE-2022-21819) – The Good Penguin
- PS5 Hack: Keys incoming for the mysterious CP Box? - Wololo.net
- A journey into IoT – Chip identification, BUSSide, and I2C - hn security
- Data exfiltration using a COVID-bit attack | Kaspersky official blog
- How I fuzz and hack APIs?
- Your printer is not your printer ! - Hacking Printers at Pwn2Own Part I | DEVCORE 戴夫寇爾
- chonked pt.1: MiniDLNA 1.3.2 HTTP Chunk Parsing Heap Overflow (CVE-2023-33476) Root Cause Analysis | hyprblog
- The printer goes brrrrr, again!
- CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK
- Researcher drops Lexmark RCE zero-day rather than sell vuln ‘for peanuts’ | The Daily Swig
- 考勤机安全分析报告 - FreeBuf网络安全行业门户
- Technical Advisory – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552) – NCC Group Research
- Zero Day Initiative — Announcing Pwn2Own Toronto 2022 and Introducing the SOHO Smashup!
- Hacking Brightway scooters: A case study – RoboCoffee
- Your printer is not your printer ! - Hacking Printers at Pwn2Own Part II | DEVCORE
- RTSP协议分析 - IOTsec-Zone
- Zeus WPI | Reverse engineering an e-ink display
- 对某webvpn系统加解密分析 - 先知社区
- BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution | security-research
- Rooting Xiaomi WiFi Routers
- Arlo: I'm watching you
- KUKA KR C4 | CISA
- pfBlockerNG Unauth RCE Vulnerability - IHTeam Security Blog
- Downtown Doug Brown
- Exploiting Healthcare Supply Chain Security: Merge DICOM Toolkit
- Resolving Stack Strings with Emulation
- reblog/cve-2024-0230/README.md at main · skysafe/reblog
-
摄像头漏洞分析
-
智能家居漏洞分析
- Pulling MikroTik into the Limelight — Margin Research
- nday exploit: netgear orbi unauthenticated command injection (CVE-2020-27861) | hyprblog
- Say Friend and Enter: Digitally lockpicking an advanced smart lock (Part 2: discovered vulnerabilities)
- Say Friend and Enter: Digitally lockpicking an advanced smart lock (Part 1: functional analysis)
-
国外会议
- WordPress › Error
- Page not found - HITBSecConf2023 - Amsterdam
- The DEF CON® Media Server - Archives of the conferences
- Ping bug potentially allows remote hack of FreeBSD systemsSecurity Affairs
- IOTsec-Zoneç©èç½å®å ¨ç¤¾åº
- Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More | Sam Curry
- Bug in Honda, Nissan, Toyota Cars App Let Hackers Start The Car Remotely
- WordPress › Error
- Page not found - HITBSecConf2023 - Amsterdam
- 💀 Sploitus | Exploit 漏洞情报库 Hacktool Search Engine
- Millions of Routers at Risk: CVE-2024-21833 Threatens TP-Link Devices
- Flatlined: Analyzing Pulse Secure Firmware and Bypassing Integrity Checking - Eclypsium
- 数百万物联网设备面临 Cinterion 调制解调器漏洞的风险
Categories
Sub Categories