Book
From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
View on Amazon

IoT Security Resources

Discover curated IoT security resources including books and tools to enhance your IoT security knowledge and skills.


Latest Books

View all books

From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research

2025-08-12

Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skills set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be exploited.

vulnerability researchsoftware security

Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

2023-05-19

Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software.

vulnerability researchfuzzingfirmware emulation

Blue Fox: Arm Assembly Internals and Reverse Engineering

2023-04-11

Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices.

assemblyreverse engineering

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

2021-12-21

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.

hardware security

Latest Tools

View all tools

AFL++

AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.

fuzzing

ChipWhisperer

ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks.

glitching attackside-channel analysis

Cross-compilation Toolchains

This site provides a large number of ready-to-use cross-compilation toolchains, targetting the Linux operating system on a large number of architectures. Based on gcc and binutils, those toolchains are provided in several variants with the glibc, uClibc-ng and musl C libraries.

cross-compilation toolchain

Firmware Modification Kit

This kit is a collection of scripts and utilities to extract and rebuild linux based firmware images.

firmware packing

Semgrep

Semgrep is a fast, open-source, static analysis tool that searches code, finds bugs, and enforces secure guardrails and coding standards.

static analysisvulnerability scanner

Peach

Peach is a cross-platform fuzzer capable of performing both dumb and smart fuzzing. Peach includes a robust monitoring system allowing for fault detection, data collection, and automation of the fuzzing environment.

fuzzing
© 2025 IoTSec Pulse. All rights reserved.