Secures IoT devices with ECC-based mutual authentication, session key setup, and attack resistance for lightweight systems
-
Updated
Apr 16, 2026 - Python
Secures IoT devices with ECC-based mutual authentication, session key setup, and attack resistance for lightweight systems
🔍 Detect IoT threats on your home network with EdgeGuard, a local AI tool that ensures privacy and protects your devices from attacks.
🛡️ Detect Wi-Fi threats with this ESP8266 script. Monitor deauth storms and evil twins, generating JSON alerts for effective network security management.
🛡️ Explore network security with this educational toolkit to understand device behavior, misconfigurations, and the importance of modern protections.
🔍 Explore IoTHackBot, an open-source toolkit for IoT security testing, featuring tools for vulnerability discovery and automated assessments.
Hardware hacker’s flying probe automation stack for agent-driven target discovery, microscope mapping, safety-monitored CNC motion, probe review, and controlled pin probing.
🛡️ Free AI that blocks hackers while you sleep. Runs on cheap hardware. When someone in Tokyo gets attacked, you're protected in 30 seconds. No fees. No experts needed. Just protection. One node's detection → everyone's protection.
Hardware-verified SNN-equivalent intrusion detection system (IDS) on STM32N6 Neural-ART NPU. INT8 quantized MLP achieving 0.4561ms inference at 800MHz. First publicly documented IDS on a commodity MCU NPU with T=1 SNN-ANN equivalence validation.
Deterministic firmware-to-exploit evidence engine. Drop a firmware blob, get hash-anchored findings with SARIF + CycloneDX SBOM + verified exploit chains.
AI-powered WiFi security tool with reinforcement learning, gene evolution, and local LLM on Raspberry Pi Zero 2W. Captures WPA/WPA2 handshakes autonomously with e-paper display. Inspired by Pwnagotchi + Bjorn + PicoClaw.
Network security scanner and monitoring tool
Stacked Ensemble ML-based Intrusion Detection System for IoT with SHAP-powered Explainable AI and multi-dataset evaluation.
RouterOS Attack & Exploitation Framework — 40 CVE/EDB exploits, MAC-Server L2, credential decoder, NPK analyzer, 300-thread BF, Nmap NSE auto-install, pip package, CVE scanner. v3.5.4
The most comprehensive wordlist generation toolkit for pentest, red team, and security research. 25 subcommands: charset, profile, corp-users, default-creds, password-dna, DNS fuzzing, web scraping, ISP keygen, ICS/SCADA credentials, ML training, pipal analysis, and more. Python 3.8+ | pip install wfh-wordlist
A scalable AWS IoT administration tool for importing pre-provisioned X.509 certificates to AWS IoT Core. Thingpress enables secure device onboarding by importing certificates from secure elements and trusted platform modules, while automatically creating and associating AWS IoT Things, Policies, Thing Types, and Thing Groups.
Detecting Cryptojacking in IoT via Side-Channel Analysis. Replicates and extends ML models to assess their robustness against adversarial attacks.
Python-based IoT Security Toolkit for Medical Devices, EEG Data Protection, and Agricultural Sensor Networks
Cheap but deadly — Raspberry Pi Pico as a USB Rubber Ducky. DuckyScript payloads, stealth USB mode, web UI on Pico W. No Hak5 needed.
A high-integrity IoT attendance framework featuring Edge-layer AES-256 encryption, local SQLite buffering for network resilience, and AI-powered risk analytics for secure biometric data sync.
Add a description, image, and links to the iot-security topic page so that developers can more easily learn about it.
To associate your repository with the iot-security topic, visit your repo's landing page and select "manage topics."