robot_hacking_manual
Lucifer
robot_hacking_manual | Lucifer | |
---|---|---|
12 | 1 | |
282 | 341 | |
- | - | |
0.0 | 0.0 | |
about 1 year ago | over 1 year ago | |
TeX | Python | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
robot_hacking_manual
- Robot Hacking Manual (RHM) v0.5, an introductory series about cybersecurity for robots
- Robot hacks, robot vulnerabilities and attacks due to cybersecurity issues
- Robot Hacking Manual (RHM) v0.4
- Robot Hacking Manual (RHM) v0.4. From robotics to cybersecurity
-
Robot Hacking Manual (RHM)
For those willing to contribute, please do so by sending PRs to https://github.com/vmayoral/robot_hacking_manual. Credit will be acknowledged appropriately.
- Robot Hacking Manual (RHM). Papers, notes and writeups from a journey into robot cybersecurity.
- Robot Hacking Manual (RHM). From robotics to cybersecurity
Lucifer
What are some alternatives?
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
heimdall-framework - USB threat evaluation framework for Linux
webots - Webots Robot Simulator
meerk40t - Hackable Laser software for the K40 Stock-LIHUIYU laser boards.
logkeys - :memo: :keyboard: A GNU/Linux keylogger that works!
pwncat - Fancy reverse and bind shell handler
WiFi-Project - Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
cloud-lusat - Cloud Internal Threat Intelligence Feeds, Inventory and Compliance Data Collection
sans-indexes - Indexes for SANS Courses and GIAC Certifications
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.