Resources

AttifyOS

A pre-configured Linux distribution for IoT and embedded security practitioners working across firmware, reverse engineering, hardware, RF, and network testing workflows.

AttifyOS was built to reduce the setup friction that slows down IoT assessments. Instead of assembling a fresh environment for firmware analysis, radio work, reversing, and device testing, practitioners get a distro oriented around the job itself.

It is most useful when the assessment path crosses multiple layers and the environment needs to keep up with firmware, radio, hardware, and network-facing work in the same session.

Access

The project is available on GitHub. Use it as a starting point for lab setup, practice, and real IoT security workflows.

What AttifyOS includes

Firmware and embedded analysis

  • Binwalk, Firmware Analysis Toolkit, and Firmware-Mod-Kit workflows
  • GHIDRA, radare2, Cutter, and JADx for reversing and inspection
  • Support for extraction, unpacking, and emulation-oriented analysis

Wireless and RF work

  • GNURadio, GQRX, GR-GSM, and URH-style workflows
  • HackRF, RTL-SDR, and Ubertooth-adjacent tooling
  • Useful coverage for SDR, signal analysis, and wireless testing labs

Hardware and attack-surface support

  • Tools that help during UART, SPI, I2C, and device-interface work
  • Pre-configured environment for moving between software and hardware tasks
  • Better continuity across firmware, radio, network, and device workflows
AttifyOS desktop screenshot
AttifyOS shell and tooling screenshot

How practitioners use it

Lab bootstrap

Use AttifyOS to avoid rebuilding an IoT pentest environment from scratch every time you need firmware, reversing, RF, and device tooling in one place.

Cross-layer assessments

It is most useful when work moves across hardware interfaces, firmware artifacts, wireless paths, and network-facing behavior during the same engagement.

Training and practice

The distro works well as a learning environment for practitioners who want a stable base while building offensive IoT workflows.

Go deeper with Attify

AttifyOS gives you the environment. Attify training and resources extend that into repeatable workflows, better judgment, and deeper cross-layer offensive capability.

Offensive IoT Exploitation (OIX)

Go beyond the tooling and learn the reasoning, attack-path construction, and hands-on workflows behind serious IoT assessments.

Explore OIX

More Attify resources

Browse adjacent Attify tools, references, and practitioner-facing resources for embedded and connected-device security work.

Browse resources