Home

Awesome

Awesome

A Collection for IoT Security Resources

Other Interesting Areas:


๐Ÿ› ๏ธ Approach Methodology

๐Ÿ“‘ Contents Overview

๐Ÿ›ก๏ธ IoT Security Information

๐Ÿ›ก๏ธ General Information and Resources in IoT Security

Specific Topics in IoT Security

๐ŸŒ Network

๐ŸŒ Web IoT Message Protocols

๐Ÿ“ฑ Mobile App

๐Ÿ“ก Wireless Protocols

๐Ÿ’ฝ Firmware

๐Ÿ› ๏ธ Hardware

๐Ÿ’พ Storage Medium

๐Ÿ’ณ Payment Security


Technical Research and Hacking


Proof of Concepts known Device Vulnerabilities


Community and Discussion Platforms


IoT and Hardware Security Trainings


Books for IoT Penetration Testing

2004

2007

2013

2014

2015

2016

2017

2018

2021

2022

2023

2024


Awesome CheatSheets


Search Engines for Internet-Connected Devices


YouTube Channels for IoT Pentesting


Vehicle Security Resources


IoT Vulnerabilites Checking Guides


IoT Gateway Software


IoT Pentesting OSes


Exploitation Tools


Reverse Engineering Tools


Introduction


IoT Web and Message Services

IoT Web and Message Services

MQTT

Introduction to MQTT
Security and Hacking with MQTT
Known Vulnerabilities and CVE IDs of MQTT Protocol
IoT and MQTT
Tools and Client Information
Tutorials and Guides
Advanced Topics and Applications
MQTT Softwares
Additional Resources

CoAP


RADIO HACKER QUICK START GUIDE

Cellular Hacking GSM BTS

BTS

GSM SS7 Pentesting

Hardware Tools


NFC-RFID


Zigbee ALL Stuff

SW Tools

Hardware Tools for Zigbee


BLE Intro and SW-HW Tools to pentest

StepByStepGuideToBLEUnderstandingAndExploiting
TrafficEngineeringInABluetoothPiconet
BLECharacteristics
Bluetooth And BLE PentestTools
HardwareForBluetoothHacking
Bluetooth Hacks

DECT (Digital Enhanced Cordless Telecommunications)

Software Tools && Hardware Tools

Software
Hardware

Mobile security (Android & iOS)

Android

iOS


Villages


Online Assemblers


ARM


Pentesting Firmwares and emulating and analyzing

Firmware Analysis Tools

Resources

Firmware Dev && Firmware Emulation


Firmware samples to pentest


Binary Analysis


Symlinks Attacks


Secureboot

Dev

Hacking


Storage Medium

EMMC Protocol and Techniques

Explore the world of EMMC hacking with these curated resources. Whether you're new to hardware hacking or an experienced practitioner, these links provide valuable insights into EMMC protocol, data recovery, and practical hacking techniques.


Payment Device Security

ATM Hacking


IoT hardware Overview and Hacking

Hardware Gadgets to pentest

Attacking Hardware Interfaces

SPI

UART

JTAG

TPM

SideChannel Attacks

Glitching and Fault Injection Resources

Tutorials and Case Studies

Awesome IoT Pentesting Guides


Fuzzing Things


FlipperZero

Custom Firmwares for Flipper Zero

Interesting Research on Flipper Zero

Flipper Zero 101: Guides and Resources

Cool Hacks with Flipper Zero


ICS


Automotive


Vulnerable IoT and Hardware Applications

CTF For IoT And Embeddded

Awesome Hardware, IoT, Firmware, ARM, and Reverse Engineering CTFs and Platforms

Hardware CTFs

IoT CTFs

Firmware CTFs

ARM CTFs

Reverse Engineering CTFs

Platforms for Continuous Learning


follow the people


Blogs for IoT Pentest

๐ŸŒ IoT Security Blogs