Lucifer
robot_hacking_manual
Our great sponsors
Lucifer | robot_hacking_manual | |
---|---|---|
1 | 12 | |
335 | 282 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | about 1 year ago | |
Python | TeX | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Lucifer
robot_hacking_manual
- Robot Hacking Manual (RHM) v0.5, an introductory series about cybersecurity for robots
- Robot hacks, robot vulnerabilities and attacks due to cybersecurity issues
- Robot Hacking Manual (RHM) v0.4
- Robot Hacking Manual (RHM) v0.4. From robotics to cybersecurity
-
Robot Hacking Manual (RHM)
For those willing to contribute, please do so by sending PRs to https://github.com/vmayoral/robot_hacking_manual. Credit will be acknowledged appropriately.
- Robot Hacking Manual (RHM). Papers, notes and writeups from a journey into robot cybersecurity.
- Robot Hacking Manual (RHM). From robotics to cybersecurity
What are some alternatives?
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
heimdall-framework - USB threat evaluation framework for Linux
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
meerk40t - Hackable Laser software for the K40 Stock-LIHUIYU laser boards.
webots - Webots Robot Simulator
pwncat - Fancy reverse and bind shell handler
logkeys - :memo: :keyboard: A GNU/Linux keylogger that works!
cloud-lusat - Cloud Internal Threat Intelligence Feeds, Inventory and Compliance Data Collection
WiFi-Project - Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
sans-indexes - Indexes for SANS Courses and GIAC Certifications