iot-security
There are 148 repositories under iot-security topic.
smart-abac-elixir
Expressive and lightweight access control policies that can run within constrained IoT devices (Elixir version).
Sec_Cam
Solution installs a motion triggered Security Cam on Raspberry Pi Zero W. Designed to be nearly plug and play, so install script includes setting wlan0 (wireless) I.P. automagically and updating rc.local to apply and manage changes upon reboot. Optional IOT logic for detecting owner's presence and turning off camera, sending video attached emails when motion detection is triggered, as well as option to add a removable USB Storage device .
jibril-releases
Jibril: A performant and low impact Linux runtime security tool agent.
IoTSpotter
Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"
HolisticInfoSec-For-WebDevelopers-Fascicle2
:books: IoT :lock: Mobile :books:
sthenos-embedded-toolkit
Cross-compilation build system for creating portable, statically-linked debugging and network tools
Cybersecurity_resources
A comprehensive collection of free cybersecurity eBooks categorized by topics and updated regularly
CVE-2022-36267-PoC
PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.
lamassuiot
Lamassu is an IoT first PKI designed for industrial scenarios. This is the main code repository for Lamassu IoT where the product logic is being implemented. If you are looking for deployment instructions, please check the docs or the project's helm chart repository.
WiFiSpider
A stealthy captive portal tool for the ESP32-2432S022 (2.2" CYD display)
nodemcu-mitm-attack
Demonstration of Man-in-the-middle attack on NodeMCU-Esp8266 microcontroller
Secure-Communication-Channel-For-IOT-Devices
Our application aims at solving the problem of electricity meter systems by automating the bill generation process by fetching the meter readings from each customers associated meter, generating a monthly bill and sending it out to each and every customer, which they can access through a web portal.
ics-iot-ot-hardening
An Industrial Control Systems (ICS), Internet of Things (IoT), and Operational Technology (OT) hardening framework offering security controls, implementation guides, and tools to protect operational technology environments.
CapSpeaker
Injecting Voices to Microphones via Capacitors
nodex
E2E Secure Messaging Platform
GenMCShodan
is a Python tool designed to search for Minecraft servers using the Shodan API. It retrieves information about servers such as their IP addresses, ports, player count, and message of the day (MOTD).
CVE-2022-36553-PoC
PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.
uart-exploiter
uart-exploiter.py by [exploitsecurity.io]
python-client
Official Python API client for ONEKEY
srujan
Srujan- Safer Networks for Smart Homes
GenZoomEyeIoTSearch
is a Python utility designed for searching IoT data using the ZoomEye API. The program allows performing two types of searches: host and web search. It provides filtering options based on various parameters such as IP addresses, ports, services, operating systems, and more
Lightweight-IDS
Lightweight IDS on Raspberry Pi Using Machine Learning
Blockchain-of-Things
Blockchain and fog computing for secure IoT data visibilty.
xtt
A C implementation of the Trusted Transit protocol for securing Internet of Things (IoT) network traffic. Created to support the Xaptum Edge Network Fabric, an IoT Network Solution.
iot_network_malware_classifier
🛡️ The IoT Network Malware Classifier 🚀 is an advanced solution tackling security concerns in IoT, employing deep learning for precise malware detection in network traffic.
IoT-Sec-Daily-News
每日IoT安全动态
easy_iotsec
Contains python script to build armv7 based debian container environment for static binary analysis
lab-InternetofInsecurity
An introductory lab to IOT device security.
ReaperBoard
Wireless pentesting toolkit: ESP8266-based Lite and CM4-based Full version in development.
exploitable-IoT-solution
!Exploitable IoT Exploit
CVE-2024-25832-PoC
PoC Script for CVE-2024-25832: Exploit chain reverse shell, information disclosure (root password leak) + unrestricted file upload in DataCube3
Tuner_code
[IoT-J & ICPADS'22] Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
FatecMesh
Esse repositório contém o projeto desenvolvido para o Trabalho de Conclusão de Curso em Segurança da Informação dos alunos da Fatec São Caetano do Sul, sob orientação do Prof. Dr. Fábio Henrique Cabrini.
routector
Routector is designed to use Criminal IP to detect vulnerable routers.
Hardware-Security-Lab
Professional Hardware Security Lab Setup | PCB analysis, firmware extraction, and embedded systems testing environment