0xff7 / IoTSecurity101Links
From IoT Pentesting to IoT Security
☆23Updated 7 years ago
Alternatives and similar repositories for IoTSecurity101
Users that are interested in IoTSecurity101 are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆78Updated 6 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- ☆28Updated 4 years ago
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- ☆28Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago