2026-01-25 22:43:30 +05:30
2024-01-01 15:52:17 +05:30
2026-01-25 22:43:30 +05:30
2025-10-04 10:02:16 +05:30
2025-08-13 08:03:09 +05:30
2023-08-01 14:08:51 +05:30
2026-01-25 17:31:59 +05:30

🔐 Awesome Connected Things Security Resources

A curated repository of IoT, Embedded, Industrial & Automotive, Core Tech security knowledge.

Awesome Badge

Last Updated


Table of Contents

Hardware Attacks

Fundamentals

Interface Attacks

UART

JTAG

SWD (Serial Wire Debug)

SPI

I2C

TPM

Memory Extraction

eMMC

Side-Channel and Fault Injection

Fundamentals

Glitching Attacks

Power Analysis

Other Microcontrollers

PCIe and DMA Attacks


Wireless Protocols

RF Fundamentals

Bluetooth / BLE

Fundamentals

Exploitation Techniques

Vulnerability Research

Conference Talks

Tools - Software

Tools - Hardware

Tools

Hacking Bluetooth Coffee Machines

Zigbee / Z-Wave

Fundamentals

Exploitation

Tools - Software

Tools - Hardware

LoRa / LoRaWAN

Fundamentals

Exploitation

Tools

Matter / Thread

Fundamentals

Security Research

Cellular (GSM/LTE/5G)

Fundamentals

Exploitation

Tools

NFC/RFID

DECT (Digital Enhanced Cordless Telecommunications)


Wi-Fi

Protocol Vulnerabilities

Exploitation

Reverse Engineering WiFi

USB

UWB (Ultra-Wideband)

TETRA


Firmware Security

Fundamentals

Extraction

Static Analysis Tools

Dynamic Analysis and Emulation

Emulation Tutorials

OTA Update Security

Fundamentals

Attack Vectors

RTOS Security

Zephyr RTOS

FreeRTOS

Reverse Engineering Tools

Reverse Engineering Tutorials

Ghidra Tutorials

Online Assemblers

ARM Exploitation

Binary Analysis

Secure Boot

Development

Bypasses

UEFI Security



Router Firmware Analysis

Router Exploitation

Netgear Series

Cisco Series

Secure Boot Bypasses

Network and Web Protocols

MQTT

Fundamentals

Security and Exploitation

Known CVEs

Tools

Applications

Malware Research

CoAP

Specifications and Security

Tools - Software

Tools - Hardware

Research and Tutorials

IoT Protocols Overview


Cloud and Backend Security

AWS IoT Security


Fundamentals

Tools

Vulnerabilities

Firebase / Cloud Misconfigurations


Mobile Application Security

Android

Android Kernel Exploitation

Android Scudo Allocator

iOS


Industrial and Automotive

ICS/SCADA

Automotive Security


EV Chargers


Payment Systems

ATM Hacking


Payment Village


Tools

Hardware Tools

Multi-Purpose

Debug Adapters

RF/SDR

USB

Glitching

Flipper Zero

Hak5

Software Tools

Exploitation Frameworks

Firmware Analysis

Fuzzing Tools

Fundamentals

IoT-Specific Fuzzing

Tools

Pentesting Operating Systems

Search Engines


Defensive Security

Threat Modeling

STRIDE Framework

IoT-Specific Threat Modeling

Secure Development


Guidelines and Standards

Hardening Guides

Incident Response


Learning Resources

Training Platforms

Cheatsheets

Vulnerability Guides

Pentesting Guides

YouTube Channels

Books

Hardware Hacking

Firmware and Reverse Engineering

IoT Security


Wireless and RF

Embedded and Mobile

NFC/RFID

Industrial and General Security

White Papers and Reports


IoT Series

Labs and CTFs

Vulnerable Applications

IoT

Router/Firmware

Hardware

Wireless

Industrial

VoIP

CTF Competitions


Hardware CTFs

IoT CTFs

Embedded/Firmware CTFs

ARM CTFs

Continuous Learning Platforms

Lab Setup


Research and Community

Technical Research

Blogs

Community Platforms

Villages


Researchers to Follow


Device-Specific Research

Cameras

Smart Home Devices

Smart Speakers

Printers

Drones

Kitchen Appliances

NAS Devices

Game Consoles

Phones/Tablets

TrustZone and TEE Research

Pwn2Own Research


Contributing

Contributions welcome. Submit a PR with new resources following the existing structure.

License

This collection is provided for educational and research purposes.