IoT Security Resources
Discover curated IoT security resources including books and tools to enhance your IoT security knowledge and skills.
Latest Books
View all booksFrom Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
2025-08-12
Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skills set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be exploited.
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
2023-05-19
Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software.
Blue Fox: Arm Assembly Internals and Reverse Engineering
2023-04-11
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices.
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
2021-12-21
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.
Latest Tools
View all toolsThis site provides a large number of ready-to-use cross-compilation toolchains, targetting the Linux operating system on a large number of architectures. Based on gcc and binutils, those toolchains are provided in several variants with the glibc, uClibc-ng and musl C libraries.