0xricksanchez / IOTOSLinks
A simple script to get your fresh Debian based OS ready for hardware hacking/reversing/exploitation
☆10Updated 6 years ago
Alternatives and similar repositories for IOTOS
Users that are interested in IOTOS are comparing it to the libraries listed below
Sorting:
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Scapy tools and scripts☆18Updated 4 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- ☆14Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Python libraries for Windows system coding☆14Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Wireless regulatory database for CRDA☆13Updated 10 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Apple wireless research and tools☆17Updated 4 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Tools for viewing and extracting HDD firmware files☆73Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆70Updated 6 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago
- ARP Man-in-the-Middle tool☆29Updated 5 months ago