IoT Security Research Group

Curated list

Download as .zip Download as .tar.gz View on GitHub

šŸ” Awesome Connected Things Security Resources

A curated repository of IoT, Embedded, Industrial & Automotive, Core Tech security knowledge.

Awesome

Typing SVG


     


         


       


Table of Contents

Hardware Attacks

Fundamentals

Interface Attacks

UART

JTAG

SWD (Serial Wire Debug)

SPI

I2C

TPM

Memory Extraction

eMMC

Side-Channel and Fault Injection

Fundamentals

Glitching Attacks

Power Analysis

Other Microcontrollers

PCIe and DMA Attacks


Wireless Protocols

RF Fundamentals

Fundamentals

Tools - Software

Tools - Hardware

Tools

Hacking Bluetooth Coffee Machines

Zigbee / Z-Wave

Fundamentals

Exploitation

Tools - Software

Tools - Hardware

LoRa / LoRaWAN

Exploitation

Tools

Matter / Thread

Fundamentals

Security Research

Cellular (GSM/LTE/5G)

Exploitation

Tools

NFC/RFID


Wi-Fi

Protocol Vulnerabilities

Exploitation

Reverse Engineering WiFi

UWB (Ultra-Wideband)

TETRA


Firmware Security

Fundamentals

Fundamentals

Attack Vectors

RTOS Security

Zephyr RTOS

FreeRTOS

Reverse Engineering Tools

Ghidra Tutorials

Online Assemblers

ARM Exploitation

Secure Boot

Development

Bypasses

UEFI Security


Router Firmware Analysis

Router Exploitation

Netgear Series

Cisco Series

Secure Boot Bypasses

Network and Web Protocols

MQTT

Security and Exploitation

Known CVEs

Tools

Applications

Malware Research

CoAP

Tools - Software

Tools - Hardware

Research and Tutorials

IoT Protocols Overview

AWS IoT Security

Tools

Vulnerabilities

Firebase / Cloud Misconfigurations


Mobile Application Security

Android

Android Scudo Allocator

iOS

ICS/SCADA


Payment Systems

ATM Hacking


Tools

Hardware Tools

Debug Adapters

RF/SDR

USB

Flipper Zero

Hak5

Exploitation Frameworks

Firmware Analysis

Fuzzing Tools

IoT-Specific Fuzzing

Tools

Pentesting Operating Systems

Threat Modeling

IoT-Specific Threat Modeling

Secure Development

Hardening Guides

Incident Response


Learning Resources

Training Platforms

YouTube Channels

Hardware Hacking

Embedded and Mobile

NFC/RFID

Industrial and General Security

White Papers and Reports


IoT Series

Labs and CTFs

Vulnerable Applications

Router/Firmware

Hardware

Wireless

Industrial

VoIP

CTF Competitions


Hardware CTFs

IoT CTFs

Embedded/Firmware CTFs

ARM CTFs

Continuous Learning Platforms

Lab Setup


Research and Community

Technical Research

Blogs


Device-Specific Research

Cameras

Smart Home Devices

Smart Speakers

Printers

Drones

Kitchen Appliances

NAS Devices

Game Consoles

Phones/Tablets

TrustZone and TEE Research

Pwn2Own Research

License

This collection is provided for educational and research purposes.