Files
awesome-connected-things-sec/README.md
2026-01-25 12:43:39 +05:30

110 KiB
Raw Blame History

🔐 Awesome Connected Things Security Resources

A curated repository of IoT, Embedded, Industrial & Automotive, Core Tech security knowledge.

Awesome Badge

Last Updated


Table of Contents


Hardware Attacks

Fundamentals

Interface Attacks

UART

JTAG

SWD (Serial Wire Debug)

SPI

I2C

TPM

Memory Extraction

eMMC

Side-Channel and Fault Injection

Fundamentals

Glitching Attacks

Power Analysis


Wireless Protocols

RF Fundamentals

Bluetooth / BLE

Fundamentals

Exploitation Techniques

Vulnerability Research

Conference Talks

Tools - Software

Tools - Hardware

Zigbee / Z-Wave

Fundamentals

Exploitation

Tools - Software

Tools - Hardware

LoRa / LoRaWAN

Fundamentals

Exploitation

Tools

Matter / Thread

Fundamentals

Security Research

Cellular (GSM/LTE/5G)

Fundamentals

Exploitation

Tools

NFC/RFID

DECT (Digital Enhanced Cordless Telecommunications)


Firmware Security

Fundamentals

Extraction

Static Analysis Tools

Dynamic Analysis and Emulation

Emulation Tutorials

OTA Update Security

Fundamentals

Attack Vectors

RTOS Security

Zephyr RTOS

FreeRTOS

Reverse Engineering Tools

Reverse Engineering Tutorials

Online Assemblers

ARM Exploitation

Binary Analysis

Secure Boot

Development

Bypasses

UEFI Security


Network and Web Protocols

MQTT

Fundamentals

Security and Exploitation

Known CVEs

Tools

Applications

Malware Research

CoAP

Specifications and Security

Tools - Software

Tools - Hardware

Research and Tutorials

IoT Protocols Overview


Cloud and Backend Security

AWS IoT Security

Fundamentals

Tools

Vulnerabilities

Firebase / Cloud Misconfigurations


Mobile Application Security

Android

iOS


Industrial and Automotive

ICS/SCADA

Automotive Security


Payment Systems

ATM Hacking

Payment Village


Tools

Hardware Tools

Multi-Purpose

Debug Adapters

RF/SDR

USB

Glitching

Flipper Zero

Hak5

Software Tools

Exploitation Frameworks

Firmware Analysis

Fuzzing Tools

Fundamentals

IoT-Specific Fuzzing

Tools

Pentesting Operating Systems

Search Engines


Defensive Security

Threat Modeling

STRIDE Framework

IoT-Specific Threat Modeling

Secure Development

Guidelines and Standards

Hardening Guides

Incident Response


Learning Resources

Training Platforms

Cheatsheets

Vulnerability Guides

Pentesting Guides

YouTube Channels

Books

Hardware Hacking

Firmware and Reverse Engineering

IoT Security

Wireless and RF

Embedded and Mobile

NFC/RFID

Industrial and General Security

White Papers and Reports


Labs and CTFs

Vulnerable Applications

IoT

Router/Firmware

Hardware

Wireless

Industrial

VoIP

CTF Competitions

Hardware CTFs

IoT CTFs

Embedded/Firmware CTFs

ARM CTFs

Continuous Learning Platforms

Lab Setup


Research and Community

Technical Research

Blogs

Community Platforms

Villages

Researchers to Follow


Contributing

Contributions welcome. Submit a PR with new resources following the existing structure.

License

This collection is provided for educational and research purposes.


Glitcher Part 1 - Reproducible Voltage Glitching on STM32 Microcontrollers](https://sec-consult.com/blog/detail/secglitcher-part-1-reproducible-voltage-glitching-on-stm32-microcontrollers/)

Other Microcontrollers

PCIe and DMA Attacks


Wireless Protocols

RF Fundamentals

Bluetooth / BLE

Fundamentals

Exploitation Techniques

Vulnerability Research

Tools

Hacking Bluetooth Coffee Machines

Wi-Fi

Protocol Vulnerabilities

Exploitation

Reverse Engineering WiFi

Zigbee / Z-Wave

LoRa / LoRaWAN

Cellular (GSM/LTE/5G)

NFC/RFID

USB

UWB (Ultra-Wideband)

TETRA


Firmware Security

Fundamentals

Extraction

Static Analysis Tools

Dynamic Analysis and Emulation

Emulation Tutorials

Router Firmware Analysis

Router Exploitation

Netgear Series

Cisco Series

Reverse Engineering Tools

Ghidra Tutorials

ARM Exploitation

Secure Boot Bypasses

UEFI Security


Network and Web Protocols

MQTT

CoAP

IoT Protocols Overview


Cloud and Backend Security

AWS IoT Security


Mobile Application Security

Android

Android Kernel Exploitation

Android Scudo Allocator

iOS


Industrial and Automotive

ICS/SCADA

Automotive Security

EV Chargers


Payment Systems

ATM Hacking


Tools

Hardware Tools

Software Tools

Fuzzing Tools

Pentesting Operating Systems

Search Engines


Defensive Security

Threat Modeling

Secure Development


Learning Resources

Training Platforms

Cheatsheets

Vulnerability Guides

IoT Series

YouTube Channels

Books

Hardware Hacking

Firmware and Reverse Engineering

IoT Security


Labs and CTFs

Vulnerable Applications

CTF Competitions


Research and Community

Device-Specific Research

Cameras

Smart Home Devices

Smart Speakers

Printers

Drones

Kitchen Appliances

NAS Devices

Game Consoles

Phones/Tablets

TrustZone and TEE Research

Pwn2Own Research

Blogs

Community Platforms

Villages


Contributing

Contributions welcome. Submit a PR with new resources following the existing structure.

License

This collection is provided for educational and research purposes.


Version 3.0 - Enhanced with 400+ additional resources from recent cybersecurity research (2019-2025)