<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Track Awesome Embedded and Iot Security Updates Daily</title>
  <id>https://www.trackawesomelist.com/fkie-cad/awesome-embedded-and-iot-security/feed.xml</id>
  <updated>2023-10-17T14:46:20.244Z</updated>
  <link rel="self" type="application/atom+xml" href="https://www.trackawesomelist.com/fkie-cad/awesome-embedded-and-iot-security/feed.xml"/>
  <link rel="alternate" type="application/json" href="https://www.trackawesomelist.com/fkie-cad/awesome-embedded-and-iot-security/feed.json"/>
  <link rel="alternate" type="text/html" href="https://www.trackawesomelist.com/fkie-cad/awesome-embedded-and-iot-security/"/>
  <generator uri="https://github.com/bcomnes/jsonfeed-to-atom#readme" version="1.2.2">jsonfeed-to-atom</generator>
  <icon>https://www.trackawesomelist.com/favicon.ico</icon>
  <logo>https://www.trackawesomelist.com/icon.png</logo>
  <subtitle>A curated list of awesome embedded and IoT security resources.</subtitle>
  <entry>
    <id>https://www.trackawesomelist.com/2023/10/17/</id>
    <title>Awesome Embedded and Iot Security Updates on Oct 17, 2023</title>
    <updated>2023-10-17T14:46:20.244Z</updated>
    <published>2023-10-17T14:46:20.244Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://github.com/fkie-cad/cwe_checker" rel="noopener noreferrer">cwe_checker (⭐957)</a> - Finds vulnerable patterns in binary executables - ELF support for x86, ARM, and MIPS, experimental bare-metal support.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/10/17/"/>
    <summary>1 awesome projects updated on Oct 17, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2023/05/26/</id>
    <title>Awesome Embedded and Iot Security Updates on May 26, 2023</title>
    <updated>2023-05-26T06:11:10.754Z</updated>
    <published>2023-05-26T06:11:10.752Z</published>
    <content type="html"><![CDATA[<h3><p>Websites / YouTube Channels</p>
</h3>
<ul>
<li><a href="https://www.youtube.com/c/FlashbackTeam" rel="noopener noreferrer">Flashback Team</a> - A duo of hackers explaining their step by step approach to finding and exploiting vulnerabilities in embedded devices.</li>
</ul>

<ul>
<li><a href="https://www.youtube.com/c/stacksmashing" rel="noopener noreferrer">StackSmashing</a> - Reverse engineering and hardware hacking of embedded devices.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2023/05/26/"/>
    <summary>2 awesome projects updated on May 26, 2023</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/12/29/</id>
    <title>Awesome Embedded and Iot Security Updates on Dec 29, 2020</title>
    <updated>2020-12-29T14:14:25.000Z</updated>
    <published>2020-12-29T14:14:25.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://github.com/e-m-b-a/emba" rel="noopener noreferrer">emba (⭐2.1k)</a> - Analyze Linux-based firmware of embedded devices.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/12/29/"/>
    <summary>1 awesome projects updated on Dec 29, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/10/06/</id>
    <title>Awesome Embedded and Iot Security Updates on Oct 06, 2020</title>
    <updated>2020-10-06T09:13:31.000Z</updated>
    <published>2020-10-06T09:13:31.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://github.com/ReFirmLabs/binwalk" rel="noopener noreferrer">Binwalk (⭐9.7k)</a> - Searches a binary for "interesting" stuff, as well as extracts arbitrary files.</li>
</ul>
<h3><p>Conferences / YouTube Channels</p>
</h3>
<ul>
<li><a href="https://hardwear.io/" rel="noopener noreferrer">Hardwear.io</a><ul>
<li>EU, The Hague, September.</li>
<li>USA, Santa Clara, June.</li>
</ul>
</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/10/06/"/>
    <summary>2 awesome projects updated on Oct 06, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/10/05/</id>
    <title>Awesome Embedded and Iot Security Updates on Oct 05, 2020</title>
    <updated>2020-10-05T11:54:01.000Z</updated>
    <published>2020-10-05T11:54:01.000Z</published>
    <content type="html"><![CDATA[<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2020, Oser et al: <a href="https://dl.acm.org/doi/abs/10.1145/3414173" rel="noopener noreferrer">SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/10/05/"/>
    <summary>1 awesome projects updated on Oct 05, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/05/06/</id>
    <title>Awesome Embedded and Iot Security Updates on May 06, 2020</title>
    <updated>2020-05-06T09:49:17.000Z</updated>
    <published>2020-05-06T09:42:27.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hardware Tools / SDR Tools</p>
</h3>
<ul>
<li><a href="https://www.rtl-sdr.com/buy-rtl-sdr-dvb-t-dongles/" rel="noopener noreferrer">RTL-SDR</a> - Cheapest SDR for beginners. It is a computer based radio scanner for receiving live radio signals frequencies from 500 kHz up to 1.75 GHz.</li>
</ul>
<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2019, Agarwal et al: <a href="https://www.mdpi.com/1424-8220/19/19/4107" rel="noopener noreferrer">Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk</a></li>
</ul>
<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://doi.org/10.5281/zenodo.1035034" rel="noopener noreferrer">IoT Security@CERN</a></li>
</ul>
<h3><p>Websites / Blogs</p>
</h3>
<ul>
<li><a href="https://www.rtl-sdr.com/" rel="noopener noreferrer">RTL-SDR</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/05/06/"/>
    <summary>4 awesome projects updated on May 06, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/05/05/</id>
    <title>Awesome Embedded and Iot Security Updates on May 05, 2020</title>
    <updated>2020-05-05T11:37:51.000Z</updated>
    <published>2020-05-05T06:31:48.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Frameworks</p>
</h3>
<ul>
<li><a href="https://github.com/ElevenPaths/HomePWN" rel="noopener noreferrer">HomePWN (⭐787)</a> - Swiss Army Knife for Pentesting of IoT Devices.</li>
</ul>
<h3><p>Software Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="https://github.com/Samsung/cotopaxi" rel="noopener noreferrer">Cotopaxi (⭐334)</a> - Set of tools for security testing of Internet of Things devices using specific network IoT protocols.</li>
</ul>

<ul>
<li><a href="https://github.com/ohjeongwook/dumpflash" rel="noopener noreferrer">dumpflash (⭐264)</a> - Low-level NAND Flash dump and parsing utility.</li>
</ul>

<ul>
<li><a href="https://github.com/flashrom/flashrom" rel="noopener noreferrer">flashrom (⭐731)</a> - Tool for detecting, reading, writing, verifying and erasing flash chips.</li>
</ul>

<ul>
<li><a href="https://github.com/chrivers/samsung-firmware-magic" rel="noopener noreferrer">Samsung Firmware Magic (⭐191)</a> - Decrypt Samsung SSD firmware updates.</li>
</ul>
<h3><p>Hardware Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="https://hydrabus.com/hydrabus-1-0-specifications/" rel="noopener noreferrer">HydraBus</a> - Open source multi-tool hardware similar to the BusPirate but with NFC capabilities.</li>
</ul>

<ul>
<li><a href="https://github.com/GlasgowEmbedded/Glasgow" rel="noopener noreferrer">Glasgow (⭐1.8k)</a> - Tool for exploring and debugging different digital interfaces.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2020, Fotios Chantzis, Evangel Deirme, Ioannis Stais, Paulino Calderon, Beau Woods: <a href="https://www.amazon.com/Fotios-Chantzis-ebook/dp/B085BVVSN6/" rel="noopener noreferrer">Practical IoT Hacking</a></li>
</ul>

<ul>
<li>2018, Qing Yang, Lin Huang <a href="https://link.springer.com/book/10.1007/978-981-10-8447-8" rel="noopener noreferrer">Inside Radio: An Attack and Defense Guide</a></li>
</ul>

<ul>
<li>2015, Joshua Wright , Johnny Cache: <a href="https://www.mhprofessional.com/9780071827638-usa-hacking-exposed-wireless-third-edition-group" rel="noopener noreferrer">Hacking Wireless Exposed</a></li>
</ul>
<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2014, Costin et al: <a href="http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf" rel="noopener noreferrer">A Large-Scale Analysis of the Security of Embedded Firmwares</a></li>
</ul>
<h3><p>Websites / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://owasp.org/www-project-internet-of-things/" rel="noopener noreferrer">OWASP Internet of Things Project</a> - IoT common vulnerabilities and attack surfaces.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/05/05/"/>
    <summary>12 awesome projects updated on May 05, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/05/04/</id>
    <title>Awesome Embedded and Iot Security Updates on May 04, 2020</title>
    <updated>2020-05-04T10:32:50.000Z</updated>
    <published>2020-05-04T10:32:50.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hardware Tools / ZigBee Tools</p>
</h3>
<ul>
<li>Atmel RZUSBstick - Discontinued product. Lucky if you have one! - Tool for development, debugging and demonstration of a wide range of low power wireless applications including IEEE 802.15.4, 6LoWPAN, and ZigBee networks. Killerbee compatible.</li>
</ul>
<h3><p>Hardware Tools / SDR Tools</p>
</h3>
<ul>
<li><a href="https://greatscottgadgets.com/hackrf/" rel="noopener noreferrer">HackRF One</a> - Software Defined Radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz (half-duplex).</li>
</ul>
<h3><p>Hardware Tools / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://www.proxmark.com/" rel="noopener noreferrer">Proxmark 3 RDV4</a> - Powerful general purpose RFID tool. From Low Frequency (125kHz) to High Frequency (13.56MHz) tags.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2015, Keng Tiong Ng: <a href="https://visio-for-engineers.blogspot.com/p/order.html" rel="noopener noreferrer">The Art of PCB Reverse Engineering</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/05/04/"/>
    <summary>4 awesome projects updated on May 04, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/05/03/</id>
    <title>Awesome Embedded and Iot Security Updates on May 03, 2020</title>
    <updated>2020-05-03T15:27:11.000Z</updated>
    <published>2020-05-03T15:27:11.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hardware Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="https://int3.cc/products/the-shikra" rel="noopener noreferrer">Shikra</a> - Detects and interacts with hardware debug ports like UART and JTAG. Among other protocols.</li>
</ul>
<h3><p>Hardware Tools / Bluetooth BLE Tools</p>
</h3>
<ul>
<li><a href="https://greatscottgadgets.com/ubertoothone/" rel="noopener noreferrer">UberTooth One</a> - Open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation.</li>
</ul>

<ul>
<li><a href="https://www.adafruit.com/product/2269" rel="noopener noreferrer">Bluefruit LE Sniffer</a> - Easy to use Bluetooth Low Energy sniffer.</li>
</ul>
<h3><p>Hardware Tools / ZigBee Tools</p>
</h3>
<ul>
<li><a href="http://apimote.com" rel="noopener noreferrer">ApiMote</a> - ZigBee security research hardware for learning about and evaluating the security of IEEE 802.15.4/ZigBee systems. Killerbee compatible.</li>
</ul>

<ul>
<li><a href="https://freaklabsstore.com/index.php?main_page=product_info&amp;cPath=22&amp;products_id=219&amp;zenid=fpmu2kuuk4abjf6aurt3bjnfk4" rel="noopener noreferrer">Freakduino</a> - Low Cost Battery Operated Wireless Arduino Board that can be turned into a IEEE 802.15.4 protocol sniffer.</li>
</ul>
<h3><p>Hardware Tools / SDR Tools</p>
</h3>
<ul>
<li><a href="https://greatscottgadgets.com/yardstickone/" rel="noopener noreferrer">YardStick One</a> - Half-duplex sub-1 GHz wireless transceiver.</li>
</ul>

<ul>
<li><a href="https://www.crowdsupply.com/lime-micro/limesdr" rel="noopener noreferrer">LimeSDR</a> - Software Defined Radio peripheral capable of transmission or reception of radio signals from 100 KHz to 3.8 GHz (full-duplex).</li>
</ul>

<ul>
<li><a href="https://www.nuand.com/bladerf-2-0-micro/" rel="noopener noreferrer">BladeRF 2.0</a> - Software Defined Radio peripheral capable of transmission or reception of radio signals from 47 MHz to 6 GHz (full-duplex).</li>
</ul>

<ul>
<li><a href="https://www.ettus.com/product-categories/usrp-bus-series/" rel="noopener noreferrer">USRP B Series</a> - Software Defined Radio peripheral capable of transmission or reception of radio signals from 70 MHz to 6 GHz (full-duplex).</li>
</ul>
<h3><p>Hardware Tools / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="http://chameleontiny.com/" rel="noopener noreferrer">ChamaleonMini</a> - Programmable, portable tool for NFC security analysis.</li>
</ul>

<ul>
<li><a href="https://hydrabus.com/hydranfc-1-0-specifications/" rel="noopener noreferrer">HydraNFC</a> - Powerful 13.56MHz RFID / NFC platform. Read / write / crack / sniff / emulate.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2020, Jasper van Woudenberg, Colin O'Flynn: <a href="https://nostarch.com/hardwarehacking" rel="noopener noreferrer">The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks</a></li>
</ul>

<ul>
<li>2018, Mark Carney: <a href="https://github.com/unprovable/PentestHardware" rel="noopener noreferrer">Pentesting Hardware - A Practical Handbook (DRAFT) (⭐486)</a></li>
</ul>
<h3><p>Websites / Blogs</p>
</h3>
<ul>
<li><a href="https://firmwaresecurity.com/" rel="noopener noreferrer">Firmware Security</a></li>
</ul>

<ul>
<li><a href="https://www.pentestpartners.com/internet-of-things/" rel="noopener noreferrer">PenTestPartners</a></li>
</ul>

<ul>
<li><a href="https://blog.attify.com/" rel="noopener noreferrer">Attify</a></li>
</ul>

<ul>
<li><a href="https://payatu.com/blog" rel="noopener noreferrer">Patayu</a></li>
</ul>

<ul>
<li><a href="https://gracefulsecurity.com/category/hardware/" rel="noopener noreferrer">GracefulSecurity - Hardware tag</a></li>
</ul>

<ul>
<li><a href="https://www.blackhillsinfosec.com/tag/hardware-hacking/" rel="noopener noreferrer">Black Hills - Hardware Hacking tag</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/05/03/"/>
    <summary>19 awesome projects updated on May 03, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/04/14/</id>
    <title>Awesome Embedded and Iot Security Updates on Apr 14, 2020</title>
    <updated>2020-04-14T06:47:51.000Z</updated>
    <published>2020-04-14T06:47:51.000Z</published>
    <content type="html"><![CDATA[<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://www.iotpentest.com/2019/06/dumping-firmware-from-device-using.html" rel="noopener noreferrer">Dumping firmware from a device's SPI flash with a buspirate</a></li>
</ul>
<h3><p>Websites / Tutorials and Technical Background</p>
</h3>
<ul>
<li><a href="https://azeria-labs.com/" rel="noopener noreferrer">Azeria Lab</a> - Miscellaneous ARM related Tutorials.</li>
</ul>

<ul>
<li><a href="https://blog.senr.io/blog/jtag-explained#" rel="noopener noreferrer">JTAG Explained</a> - A walkthrough covering UART and JTAG bypassing a protected login shell.</li>
</ul>

<ul>
<li><a href="http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/" rel="noopener noreferrer">Reverse Engineering Serial Ports</a> - Detailed tutorial about how to spot debug pads on a PCB.</li>
</ul>

<ul>
<li><a href="https://www.mikroe.com/blog/uart-serial-communication" rel="noopener noreferrer">UART explained</a> - An in depth explanation of the UART protocol.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/04/14/"/>
    <summary>5 awesome projects updated on Apr 14, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/04/11/</id>
    <title>Awesome Embedded and Iot Security Updates on Apr 11, 2020</title>
    <updated>2020-04-11T13:07:36.000Z</updated>
    <published>2020-04-11T13:07:36.000Z</published>
    <content type="html"><![CDATA[<h3><p>Websites / Blogs</p>
</h3>
<ul>
<li><a href="https://wrongbaud.github.io/" rel="noopener noreferrer">wrong baud</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/04/11/"/>
    <summary>1 awesome projects updated on Apr 11, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/04/09/</id>
    <title>Awesome Embedded and Iot Security Updates on Apr 09, 2020</title>
    <updated>2020-04-09T08:43:02.000Z</updated>
    <published>2020-04-09T08:43:02.000Z</published>
    <content type="html"><![CDATA[<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2015, Shoshitaishvili et al:<a href="https://www.ndss-symposium.org/wp-content/uploads/2017/09/11_1_2.pdf" rel="noopener noreferrer">Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware</a></li>
</ul>
<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://cturt.github.io/ps4.html" rel="noopener noreferrer">Hacking the PS4</a> - Introduction to PS4's security.</li>
</ul>
<h3><p>Websites / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://owasp.org/www-project-embedded-application-security/" rel="noopener noreferrer">OWASP Embedded Application Security Project</a> - Development best practices and list of hardware and software tools.</li>
</ul>

<ul>
<li><a href="https://siliconpr0n.org/" rel="noopener noreferrer">Siliconpr0n</a> - A Wiki/Archive of all things IC reversing.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/04/09/"/>
    <summary>4 awesome projects updated on Apr 09, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/03/31/</id>
    <title>Awesome Embedded and Iot Security Updates on Mar 31, 2020</title>
    <updated>2020-03-31T17:28:13.000Z</updated>
    <published>2020-03-31T17:28:13.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Frameworks</p>
</h3>
<ul>
<li><a href="https://github.com/emsec/hal" rel="noopener noreferrer">HAL – The Hardware Analyzer (⭐480)</a> - A comprehensive reverse engineering and manipulation framework for gate-level netlists.</li>
</ul>

<ul>
<li><a href="https://gitlab.com/invuls/iot-projects/iotsecfuzz" rel="noopener noreferrer">IoTSecFuzz</a> - Framework for automatisation of IoT layers security analysis: hardware, software and communication.</li>
</ul>

<ul>
<li><a href="https://github.com/riverloopsec/killerbee" rel="noopener noreferrer">Killerbee (⭐707)</a> - Framework for Testing &amp; Auditing ZigBee and IEEE 802.15.4 Networks.</li>
</ul>

<ul>
<li><a href="https://github.com/RUB-NDS/PRET" rel="noopener noreferrer">PRET (⭐3.6k)</a> - Printer Exploitation Toolkit.</li>
</ul>

<ul>
<li><a href="https://github.com/threat9/routersploit" rel="noopener noreferrer">Routersploit (⭐11k)</a> - Framework dedicated to exploit embedded devices.</li>
</ul>
<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://github.com/craigz28/firmwalker" rel="noopener noreferrer">Firmwalker (⭐942)</a> - Searches extracted firmware images for interesting files and information.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2017, Aditya Gupta, Aaron Guzman: <a href="https://www.packtpub.com/networking-and-servers/iot-penetration-testing-cookbook" rel="noopener noreferrer">IoT Penetration Testing Cookbook</a></li>
</ul>
<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2019, Almakhdhub et al: <a href="https://nebelwelt.net/publications/files/19DSN.pdf" rel="noopener noreferrer">BenchIoT: A Security Benchmark for the Internet of Things</a></li>
</ul>
<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="http://www.devttys0.com/2014/02/cracking-linksys-crypto/" rel="noopener noreferrer">Cracking Linksys “Encryption”</a></li>
</ul>

<ul>
<li><a href="https://www.bored-nerds.com/reversing/radare/automotive/2019/07/07/reversing-firmware-with-radare.html" rel="noopener noreferrer">Reversing Firmware With Radare</a></li>
</ul>

<ul>
<li><a href="http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/" rel="noopener noreferrer">Reversing the Huawei HG533</a></li>
</ul>
<h3><p>Free Training / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://github.com/TrustworthyComputing/csaw_esc_2019" rel="noopener noreferrer">CSAW Embedded Security Challenge 2019 (⭐33)</a> - CSAW 2019 Embedded Security Challenge (ESC).</li>
</ul>

<ul>
<li><a href="https://microcorruption.com" rel="noopener noreferrer">Embedded Security CTF</a> - Microcorruption: Embedded Security CTF.</li>
</ul>

<ul>
<li><a href="https://github.com/Riscure/Rhme-2016" rel="noopener noreferrer">Rhme-2016 (⭐286)</a> - Riscure Hack me 2 is a low level hardware CTF challenge.</li>
</ul>

<ul>
<li><a href="https://github.com/Riscure/Rhme-2017" rel="noopener noreferrer">Rhme-2017/2018 (⭐84)</a> - Riscure Hack Me 3 embedded hardware CTF 2017-2018.</li>
</ul>
<h3><p>Websites / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="http://hacking-printers.net/wiki/index.php/Main_Page" rel="noopener noreferrer">Hacking Printers Wiki</a> - All things printer.</li>
</ul>

<ul>
<li><a href="https://192-168-1-1ip.mobi/default-router-passwords-list/" rel="noopener noreferrer">Router Passwords</a> - Default login credential database sorted by manufacturer.</li>
</ul>
<h3><p>Websites / Blogs</p>
</h3>
<ul>
<li><a href="http://www.devttys0.com/blog/" rel="noopener noreferrer">/dev/ttyS0's Embedded Device Hacking</a></li>
</ul>

<ul>
<li><a href="https://www.exploitee.rs/" rel="noopener noreferrer">Exploiteers</a></li>
</ul>

<ul>
<li><a href="https://hackaday.com" rel="noopener noreferrer">Hackaday</a></li>
</ul>

<ul>
<li><a href="https://jcjc-dev.com/" rel="noopener noreferrer">jcjc's Hack The World</a></li>
</ul>

<ul>
<li><a href="https://blog.quarkslab.com/" rel="noopener noreferrer">Quarkslab</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/03/31/"/>
    <summary>22 awesome projects updated on Mar 31, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2020/02/12/</id>
    <title>Awesome Embedded and Iot Security Updates on Feb 12, 2020</title>
    <updated>2020-02-12T12:29:18.000Z</updated>
    <published>2020-02-12T12:22:13.000Z</published>
    <content type="html"><![CDATA[<h3><p>Hardware Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="https://newae.com/chipwhisperer/" rel="noopener noreferrer">ChipWhisperer</a> - Detects Glitch/Side-channel attacks.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2019, Yago Hansen: <a href="https://github.com/yadox666/The-Hackers-Hardware-Toolkit/blob/master/TheHackersHardwareToolkit.pdf" rel="noopener noreferrer">The Hacker's Hardware Toolkit: The best collection of hardware gadgets for Red Team hackers, Pentesters and security researchers (⭐2k)</a></li>
</ul>
<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2016, Kammerstetter et al: <a href="https://www.thinkmind.org/download.php?articleid=securware_2016_2_10_30082" rel="noopener noreferrer">Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2020/02/12/"/>
    <summary>3 awesome projects updated on Feb 12, 2020</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/12/19/</id>
    <title>Awesome Embedded and Iot Security Updates on Dec 19, 2019</title>
    <updated>2019-12-19T06:58:28.000Z</updated>
    <published>2019-12-19T06:58:28.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Frameworks</p>
</h3>
<ul>
<li><a href="https://fkie-cad.github.io/FACT_core/" rel="noopener noreferrer">FACT - The Firmware Analysis and Comparison Tool</a> - Full-featured static analysis framework including extraction of firmware, analysis utilizing different plug-ins and comparison of different firmware versions.<ul>
<li><a href="https://passthesalt.ubicast.tv/videos/improving-your-firmware-security-analysis-process-with-fact/" rel="noopener noreferrer">Improving your firmware security analysis process with FACT</a> - Conference talk about FACT 📺.</li>
</ul>
</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/12/19/"/>
    <summary>1 awesome projects updated on Dec 19, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/12/18/</id>
    <title>Awesome Embedded and Iot Security Updates on Dec 18, 2019</title>
    <updated>2019-12-18T15:07:32.000Z</updated>
    <published>2019-12-18T07:32:54.000Z</published>
    <content type="html"><![CDATA[<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2019, Alrawi et al: <a href="https://alrawi.github.io/static/papers/alrawi_sok_sp19.pdf" rel="noopener noreferrer">SoK: Security Evaluation of Home-Based IoT Deployments</a></li>
</ul>

<ul>
<li>2019, Abbasi et al: <a href="https://ieeexplore.ieee.org/abstract/document/8806725" rel="noopener noreferrer">Challenges in Designing Exploit Mitigations for Deeply Embedded Systems</a></li>
</ul>

<ul>
<li>2019, Song et al: <a href="https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04A-1_Song_paper.pdf" rel="noopener noreferrer">PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary</a></li>
</ul>

<ul>
<li>2014, Zaddach et al: <a href="http://www.eurecom.fr/en/publication/4158/download/rs-publi-4158.pdf" rel="noopener noreferrer">Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares</a></li>
</ul>
<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://youtu.be/nXyglaY9N9w" rel="noopener noreferrer">Deadly Sins Of Development</a> - Conference talk presenting several real world examples on real bad implementations 📺.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/12/18/"/>
    <summary>5 awesome projects updated on Dec 18, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/08/26/</id>
    <title>Awesome Embedded and Iot Security Updates on Aug 26, 2019</title>
    <updated>2019-08-26T18:59:01.000Z</updated>
    <published>2019-08-26T18:59:01.000Z</published>
    <content type="html"><![CDATA[<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://cyber-itl.org/2019/08/26/iot-data-writeup.html" rel="noopener noreferrer">Binary Hardening in IoT products</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/08/26/"/>
    <summary>1 awesome projects updated on Aug 26, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/08/16/</id>
    <title>Awesome Embedded and Iot Security Updates on Aug 16, 2019</title>
    <updated>2019-08-16T09:36:22.000Z</updated>
    <published>2019-08-16T07:36:43.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Frameworks</p>
</h3>
<ul>
<li><a href="https://github.com/cruise-automation/fwanalyzer" rel="noopener noreferrer">FwAnalyzer (⭐474)</a> - Analyze security of firmware based on customized rules. Intended as additional step in DevSecOps, similar to CI.</li>
</ul>
<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://github.com/ChrisTheCoolHut/Firmware_Slap" rel="noopener noreferrer">Firmware Slap (⭐462)</a> - Discovering vulnerabilities in firmware through concolic analysis and function clustering.</li>
</ul>

<ul>
<li><a href="https://github.com/radare/radare2" rel="noopener noreferrer">Radare2 (⭐19k)</a> - Software Reverse Engineering framework, also handles popular formats and arbitrary binaries, has an extensive command line toolset.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/08/16/"/>
    <summary>3 awesome projects updated on Aug 16, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/08/15/</id>
    <title>Awesome Embedded and Iot Security Updates on Aug 15, 2019</title>
    <updated>2019-08-15T13:53:39.000Z</updated>
    <published>2019-08-15T13:53:39.000Z</published>
    <content type="html"><![CDATA[<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2017, O'Meara et al: <a href="https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=509271" rel="noopener noreferrer">Embedded Device Vulnerability Analysis Case Study Using Trommel</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/08/15/"/>
    <summary>1 awesome projects updated on Aug 15, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/08/08/</id>
    <title>Awesome Embedded and Iot Security Updates on Aug 08, 2019</title>
    <updated>2019-08-08T14:05:51.000Z</updated>
    <published>2019-08-08T13:58:04.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Extraction Tools</p>
</h3>
<ul>
<li><a href="http://srecord.sourceforge.net/" rel="noopener noreferrer">The SRecord package</a> - Collection of tools for manipulating EPROM files (can convert lots of binary formats).</li>
</ul>
<h3><p>Software Tools / Support Tools</p>
</h3>
<ul>
<li><a href="https://github.com/cyphunk/JTAGenum" rel="noopener noreferrer">JTAGenum (⭐625)</a> - Add JTAG capabilities to an Arduino.</li>
</ul>

<ul>
<li><a href="http://openocd.org/" rel="noopener noreferrer">OpenOCD</a> - Free and Open On-Chip Debugging, In-System Programming and Boundary-Scan Testing.</li>
</ul>
<h3><p>Hardware Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="https://www.saleae.com/" rel="noopener noreferrer">Saleae</a> - Easy to use Logic Analyzer that support many protocols 💶.</li>
</ul>

<ul>
<li><a href="https://www.ikalogic.com/pages/logic-analyzer-sp-series-sp209" rel="noopener noreferrer">Ikalogic</a> - Alternative to Saleae logic analyzers 💶.</li>
</ul>

<ul>
<li><a href="https://www.segger.com/products/debug-probes/j-link/models/model-overview/" rel="noopener noreferrer">J-Link</a> - J-Link offers USB powered JTAG debug probes for multiple different CPU cores 💶.</li>
</ul>
<h3><p>Free Training / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://github.com/rdomanski/hardware_hacking/tree/master/my_talks/Hardware_Hacking_101" rel="noopener noreferrer">Hardware Hacking 101 (⭐37)</a> - Workshop @ BSides Munich 2019.</li>
</ul>

<ul>
<li><a href="https://github.com/scriptingxss/IoTGoat" rel="noopener noreferrer">IoTGoat (⭐177)</a> - IoTGoat is a deliberately insecure firmware based on OpenWrt.</li>
</ul>

<ul>
<li><a href="https://github.com/Riscure/RHme-2015" rel="noopener noreferrer">Rhme-2015 (⭐105)</a> - First riscure Hack me hardware CTF challenge.</li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/08/08/"/>
    <summary>9 awesome projects updated on Aug 08, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/07/31/</id>
    <title>Awesome Embedded and Iot Security Updates on Jul 31, 2019</title>
    <updated>2019-07-31T07:14:27.000Z</updated>
    <published>2019-07-31T07:14:27.000Z</published>
    <content type="html"><![CDATA[<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2018, Mark Swarup Tehranipoor: <a href="https://www.elsevier.com/books/hardware-security/bhunia/978-0-12-812477-2" rel="noopener noreferrer">Hardware Security: A Hands-on Learning Approach</a></li>
</ul>

<ul>
<li>2017, Andrew Huang: <a href="https://nostarch.com/hardwarehackerpaperback" rel="noopener noreferrer">The Hardware Hacker: Adventures in Making and Breaking Hardware</a></li>
</ul>

<ul>
<li>2016, Craig Smith: <a href="https://nostarch.com/carhacking" rel="noopener noreferrer">The Car Hacker's Handbook: A Guide for the Penetration Tester</a></li>
</ul>

<ul>
<li>2015, Nitesh Dhanjan: <a href="https://shop.oreilly.com/product/0636920033547.do" rel="noopener noreferrer">Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts</a></li>
</ul>

<ul>
<li>2014, Debdeep Mukhopadhyay: <a href="https://www.taylorfrancis.com/books/9780429066900" rel="noopener noreferrer">Hardware Security: Design, Threats, and Safeguards</a></li>
</ul>

<ul>
<li>2014, Jack Ganssle: <a href="https://www.elsevier.com/books/the-firmware-handbook/ganssle/978-0-7506-7606-9" rel="noopener noreferrer">The Firmware Handbook (Embedded Technology)</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/07/31/"/>
    <summary>6 awesome projects updated on Jul 31, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/07/30/</id>
    <title>Awesome Embedded and Iot Security Updates on Jul 30, 2019</title>
    <updated>2019-07-30T10:58:45.000Z</updated>
    <published>2019-07-30T07:32:35.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://ghidra-sre.org/" rel="noopener noreferrer">Ghidra</a> - Software Reverse Engineering suite; handles arbitrary binaries, if you provide CPU architecture and endianness of the binary.</li>
</ul>
<h3><p>Hardware Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="http://dangerousprototypes.com/docs/Bus_Blaster" rel="noopener noreferrer">Bus Blaster</a> - Detects and interacts with hardware debug ports like <a href="https://en.wikipedia.org/wiki/Universal_asynchronous_receiver-transmitter" rel="noopener noreferrer">UART</a> and <a href="https://en.wikipedia.org/wiki/JTAG" rel="noopener noreferrer">JTAG</a>.</li>
</ul>

<ul>
<li><a href="http://www.grandideastudio.com/jtagulator/" rel="noopener noreferrer">JTAGULATOR</a> - Detects JTAG Pinouts fast.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2013, Andrew Huang: <a href="https://nostarch.com/xboxfree" rel="noopener noreferrer">Hacking the XBOX</a></li>
</ul>
<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html" rel="noopener noreferrer">Multiple vulnerabilities found in the D-link DWR-932B</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/07/30/"/>
    <summary>5 awesome projects updated on Jul 30, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/07/29/</id>
    <title>Awesome Embedded and Iot Security Updates on Jul 29, 2019</title>
    <updated>2019-07-29T14:10:15.000Z</updated>
    <published>2019-07-29T14:10:15.000Z</published>
    <content type="html"><![CDATA[<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2017, Jacob et al: <a href="https://eprint.iacr.org/2017/625.pdf" rel="noopener noreferrer">How to Break Secure Boot on FPGA SoCs through Malicious Hardware</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/07/29/"/>
    <summary>1 awesome projects updated on Jul 29, 2019</summary>
  </entry>
  <entry>
    <id>https://www.trackawesomelist.com/2019/07/26/</id>
    <title>Awesome Embedded and Iot Security Updates on Jul 26, 2019</title>
    <updated>2019-07-26T07:22:29.000Z</updated>
    <published>2019-07-26T07:22:29.000Z</published>
    <content type="html"><![CDATA[<h3><p>Software Tools / Analysis Frameworks</p>
</h3>
<ul>
<li><a href="https://gitlab.com/expliot_framework/expliot" rel="noopener noreferrer">EXPLIoT</a> - Pentest framework like Metasploit but specialized for IoT.</li>
</ul>
<h3><p>Software Tools / Analysis Tools</p>
</h3>
<ul>
<li><a href="https://github.com/firmadyne/firmadyne" rel="noopener noreferrer">Firmadyne (⭐1.7k)</a> - Tries to emulate and pentest a firmware.</li>
</ul>

<ul>
<li><a href="https://github.com/CERTCC/trommel" rel="noopener noreferrer">Trommel (⭐198)</a> - Searches extracted firmware images for interesting files and information.</li>
</ul>
<h3><p>Software Tools / Extraction Tools</p>
</h3>
<ul>
<li><a href="https://github.com/fkie-cad/fact_extractor" rel="noopener noreferrer">FACT Extractor (⭐68)</a> - Detects container format automatically and executes the corresponding extraction tool.</li>
</ul>

<ul>
<li><a href="https://github.com/rampageX/firmware-mod-kit/wiki" rel="noopener noreferrer">Firmware Mod Kit (⭐726)</a> - Extraction tools for several container formats.</li>
</ul>
<h3><p>Hardware Tools / Misc Tools</p>
</h3>
<ul>
<li><a href="http://dangerousprototypes.com/docs/Bus_Pirate" rel="noopener noreferrer">Bus Pirate</a> - Detects and interacts with hardware debug ports like UART and JTAG.</li>
</ul>
<h3><p>Books / RFID NFC Tools</p>
</h3>
<ul>
<li>2019, Aditya Gupta: <a href="https://www.apress.com/us/book/9781484242995" rel="noopener noreferrer">The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things</a></li>
</ul>
<h3><p>Research Papers / RFID NFC Tools</p>
</h3>
<ul>
<li>2018, Muench et al: <a href="http://www.eurecom.fr/en/publication/5417/download/sec-publi-5417.pdf" rel="noopener noreferrer">What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices</a></li>
</ul>

<ul>
<li>2017, Costin et al: <a href="http://s3.eurecom.fr/docs/ifip17_costin.pdf" rel="noopener noreferrer">Towards Automated Classification of Firmware Images and Identification of Embedded Devices</a></li>
</ul>

<ul>
<li>2016, Chen et al: <a href="https://www.dcddcc.com/docs/2016_paper_firmadyne.pdf" rel="noopener noreferrer">Towards Automated Dynamic Analysis for Linux-based Embedded Firmware</a></li>
</ul>

<ul>
<li>2016, Costin et al: <a href="http://s3.eurecom.fr/docs/asiaccs16_costin.pdf" rel="noopener noreferrer">Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces</a></li>
</ul>

<ul>
<li>2015, Papp et al: <a href="http://www.cse.psu.edu/~pdm12/cse597g-f15/readings/cse597g-embedded_systems.pdf" rel="noopener noreferrer">Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy</a></li>
</ul>

<ul>
<li>2014, Alimi et al: <a href="http://ieeexplore.ieee.org/document/6903734/" rel="noopener noreferrer">Analysis of embedded applications by evolutionary fuzzing</a></li>
</ul>

<ul>
<li>2013, Davidson et al: <a href="https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_davidson.pdf" rel="noopener noreferrer">FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution</a></li>
</ul>
<h3><p>Case Studies / RFID NFC Tools</p>
</h3>
<ul>
<li><a href="http://www.devttys0.com/2014/05/hacking-the-dspw215-again/" rel="noopener noreferrer">Hacking the DSP-W215, Again</a></li>
</ul>

<ul>
<li><a href="https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html" rel="noopener noreferrer">Pwning the Dlink 850L routers and abusing the MyDlink Cloud protocol</a></li>
</ul>

<ul>
<li><a href="https://www.fkie.fraunhofer.de/content/dam/fkie/de/documents/xerox_phaser_6700_white_paper.pdf" rel="noopener noreferrer">PWN Xerox Printers (...again)</a></li>
</ul>
]]></content>
    <link rel="alternate" href="https://www.trackawesomelist.com/2019/07/26/"/>
    <summary>17 awesome projects updated on Jul 26, 2019</summary>
  </entry>
</feed>