Cyber security

Awesome Embedded And IoT Security – Key Tools And Insights

Botnets like Mirai have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic.

If you are a beginner, you should have a look at the Books and Case Studies sections.

If you want to start right away with your own analysis, you should give the Analysis Frameworks a try.

They are easy to use and you do not need to be an expert to get first meaningful results.

Items marked with are comercial products.

Contents

  • Software Tools
    • Analysis Frameworks
    • Analysis Tools
    • Extraction Tools
    • Support Tools
    • Misc Tools
  • Hardware Tools
    • Bluetooth BLE Tools
    • ZigBee Tools
    • SDR Tools
    • RFID NFC Tools
  • Books
  • Research Papers
  • Case Studies
  • Free Training
  • Websites
    • Blogs
    • Tutorials and Technical Background
    • YouTube Channels
  • Conferences
  • Contribute
  • License

Software Tools

Software tools for analyzing embedded/IoT devices and firmware.

Analysis Frameworks

  • EXPLIoT – Pentest framework like Metasploit but specialized for IoT.
  • FACT – The Firmware Analysis and Comparison Tool – Full-featured static analysis framework including extraction of firmware, analysis utilizing different plug-ins and comparison of different firmware versions.
  • FwAnalyzer – Analyze security of firmware based on customized rules. Intended as additional step in DevSecOps, similar to CI.
  • HAL – The Hardware Analyzer – A comprehensive reverse engineering and manipulation framework for gate-level netlists.
  • HomePWN – Swiss Army Knife for Pentesting of IoT Devices.
  • IoTSecFuzz – Framework for automatisation of IoT layers security analysis: hardware, software and communication.
  • Killerbee – Framework for Testing & Auditing ZigBee and IEEE 802.15.4 Networks.
  • PRET – Printer Exploitation Toolkit.
  • Routersploit – Framework dedicated to exploit embedded devices.

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

17 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

19 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

21 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

21 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

21 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago