Explore and master Trusted Platform Module (TPM) technology with this educational repository, featuring comprehensive guides, code samples, and real-world use cases.
-
Updated
Jan 31, 2024
Explore and master Trusted Platform Module (TPM) technology with this educational repository, featuring comprehensive guides, code samples, and real-world use cases.
PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.
Command-line tools to work with Microchip Crypto-Authentication devices.
SHE is a lightweight and hybridized cryptographic system. SHE means "Secure Hybrid Encryption". It is made for robust security in IoT devices without reducing its performance. It will create a great impact for FinTech industries where security is a crucial fact while doing P2P money transactions.
PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Internet of Things (IoT) in Cybersecurity
Demonstration of Man-in-the-middle attack on NodeMCU-Esp8266 microcontroller
🛡️ The IoT Network Malware Classifier 🚀 is an advanced solution tackling security concerns in IoT, employing deep learning for precise malware detection in network traffic.
A study to find a suitable temporal-based embedding model in detecting IoT malware through network analysis
Routector is designed to use Criminal IP to detect vulnerable routers.
Testing the security of an OP-TEE installation
Jupyter notebook for IoT threat detection using ensemble machine learning. Features data preprocessing, model training (Logistic Regression, Decision Trees, Neural Networks, etc.), and ensemble techniques for enhanced accuracy.
Esse repositório contém o projeto desenvolvido para o Trabalho de Conclusão de Curso em Segurança da Informação dos alunos da Fatec São Caetano do Sul, sob orientação do Prof. Dr. Fábio Henrique Cabrini.
IOT Sensor network data protection demo
Threat model and security analysis for STEVAL-SENSORTILEBOX product from ST Microelectronics
uart-exploiter.py by [exploitsecurity.io]
DKY THM3682实验箱配套协议解析器,基于RibbonUI设计
Drivers and firmware for the Xaptum ENF router cards
Secure Smart Robot Car with Arduino. A project for IoT Security course at University of Salerno.
Add a description, image, and links to the iot-security topic page so that developers can more easily learn about it.
To associate your repository with the iot-security topic, visit your repo's landing page and select "manage topics."