Resources
AttifyOS
AttifyOS was built to reduce the setup friction that slows down IoT assessments. Instead of assembling a fresh environment for firmware analysis, radio work, reversing, and device testing, practitioners get a distro oriented around the job itself.
It is most useful when the assessment path crosses multiple layers and the environment needs to keep up with firmware, radio, hardware, and network-facing work in the same session.
Access
The project is available on GitHub. Use it as a starting point for lab setup, practice, and real IoT security workflows.
What AttifyOS includes
Firmware and embedded analysis
- Binwalk, Firmware Analysis Toolkit, and Firmware-Mod-Kit workflows
- GHIDRA, radare2, Cutter, and JADx for reversing and inspection
- Support for extraction, unpacking, and emulation-oriented analysis
Wireless and RF work
- GNURadio, GQRX, GR-GSM, and URH-style workflows
- HackRF, RTL-SDR, and Ubertooth-adjacent tooling
- Useful coverage for SDR, signal analysis, and wireless testing labs
Hardware and attack-surface support
- Tools that help during UART, SPI, I2C, and device-interface work
- Pre-configured environment for moving between software and hardware tasks
- Better continuity across firmware, radio, network, and device workflows


How practitioners use it
Lab bootstrap
Use AttifyOS to avoid rebuilding an IoT pentest environment from scratch every time you need firmware, reversing, RF, and device tooling in one place.
Cross-layer assessments
It is most useful when work moves across hardware interfaces, firmware artifacts, wireless paths, and network-facing behavior during the same engagement.
Training and practice
The distro works well as a learning environment for practitioners who want a stable base while building offensive IoT workflows.
Go deeper with Attify
AttifyOS gives you the environment. Attify training and resources extend that into repeatable workflows, better judgment, and deeper cross-layer offensive capability.
Offensive IoT Exploitation (OIX)
Go beyond the tooling and learn the reasoning, attack-path construction, and hands-on workflows behind serious IoT assessments.
Explore OIXMore Attify resources
Browse adjacent Attify tools, references, and practitioner-facing resources for embedded and connected-device security work.
Browse resources