This repository provides a Yocto Project layer to build an vulnerable IoT device. CAUTION: The deployed software has intentional vulnerabilities and backdoors. Do not use it unless you really know what you are doing.
This repository provides a Yocto Project layer to build an vulnerable IoT device. CAUTION: The deployed software has intentional vulnerabilities and backdoors. Do not use it unless you really know what you are doing.