bars
⌨️
Penetration testing & ethical hacking concepts
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
microchip
Hardware Exploitation
Resource
Walkthrough
Introduction · IoT Pentesting Guide
www.iotpentestingguide.com
chevron-right
Intro to IoT Pentesting
TryHackMe
chevron-right
Practical Reverse Engineering Part 1 - Hunting for Debug Ports
Hack The World
chevron-right
2.
Articles
https://ieeexplore-ieee-org.remotexs.ntu.edu.sg/stamp/stamp.jsp?tp=&arnumber=10724282
ieeexplore-ieee-org.remotexs.ntu.edu.sg
chevron-right
Simulation of an ethical hack attack on IoT system
Online books
file-pdf
19MB
978-1-4842-4300-8.pdf
PDF
download
Download
arrow-up-right-from-square
Open
The IoT hacker's handbook
Access with NTUSG account
The Hardware Hacking Handbook
O’Reilly Online Learning
chevron-right
Hardware Hacking Projects for Geeks
O’Reilly Online Learning
chevron-right
Previous
Linux tools
chevron-left
Next
Additional
chevron-right
Last updated
1 month ago
sun-bright
desktop
moon
sun-bright
desktop
moon