0xff7 / IoTSecurity101Links
From IoT Pentesting to IoT Security
☆23Updated 7 years ago
Alternatives and similar repositories for IoTSecurity101
Users that are interested in IoTSecurity101 are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆78Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Updated 3 years ago
- ☆26Updated 5 months ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 5 years ago
- ☆18Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 3 months ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Cisco IOS Exploit Framework☆22Updated 6 years ago
- ☆48Updated 5 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 4 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- ☆21Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- ☆45Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago