All Projects → vmayoral → robot_hacking_manual

vmayoral / robot_hacking_manual

Licence: Apache-2.0 license
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.

Programming Languages

TeX
3793 projects
python
139335 projects - #7 most used programming language
CSS
56736 projects
Dockerfile
14818 projects
c
50402 projects - #5 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to robot hacking manual

marcellelee.github.io
No description or website provided.
Stars: ✭ 27 (-84.02%)
Mutual labels:  forensics, cybersecurity, ctf
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+311.83%)
Mutual labels:  forensics, cybersecurity, ctf
community-projects
Webots projects (PROTO files, controllers, simulation worlds, etc.) contributed by the community.
Stars: ✭ 20 (-88.17%)
Mutual labels:  robot, robots
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+78.7%)
Mutual labels:  cybersecurity, cyber-security
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-75.15%)
Mutual labels:  forensics, cybersecurity
emanual
Welcome to the ROBOTIS e-Manual ! The e-Manual page rendered from this repository is available for everyone. Just simply click the provided link below :)
Stars: ✭ 105 (-37.87%)
Mutual labels:  robot, manual
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-81.66%)
Mutual labels:  forensics, cybersecurity
nsa-codebreaker-2020
My solutions to the 2020 NSA Codebreaker Challenge
Stars: ✭ 69 (-59.17%)
Mutual labels:  forensics, ctf
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-40.24%)
Mutual labels:  cybersecurity, cyber-security
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+4180.47%)
Mutual labels:  cybersecurity, cyber-security
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-86.98%)
Mutual labels:  forensics, cybersecurity
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+4.14%)
Mutual labels:  forensics, cybersecurity
sixi
Sixi Robot Arm
Stars: ✭ 23 (-86.39%)
Mutual labels:  robot, robots
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (-26.63%)
Mutual labels:  cybersecurity, cyber-security
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-63.91%)
Mutual labels:  cybersecurity, cyber-security
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-9.47%)
Mutual labels:  cybersecurity, cyber-security
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-48.52%)
Mutual labels:  cybersecurity, cyber-security
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (-50.89%)
Mutual labels:  cybersecurity, cyber-security
game-of-thrones-hacking-ctf
Game of Thrones hacking CTF (Capture the flag)
Stars: ✭ 57 (-66.27%)
Mutual labels:  cybersecurity, ctf
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+69.82%)
Mutual labels:  cybersecurity, ctf

RHM: Robot Hacking Manual

Download in PDF RHM v0.4Read online

The Robot Hacking Manual (RHM) is an introductory series about cybersecurity for robots, with an attempt to provide comprehensive case studies and step-by-step tutorials with the intent to raise awareness in the field and highlight the importance of taking a security-first1 approach. The material available here is also a personal learning attempt and it's disconnected from any particular organization. Content is provided as is and by no means I encourage or promote the unauthorized tampering of robotic systems or related technologies.

Footnotes

  1. Read on what a security-first approach in here.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].