AlgoSecure / iotmapLinks
Research project on heterogeneous IoT protocols modelling
☆54Updated 3 years ago
Alternatives and similar repositories for iotmap
Users that are interested in iotmap are comparing it to the libraries listed below
Sorting:
- Presented hardware reverse engineering workshops since 2019☆62Updated last year
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- ☆44Updated 4 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- A tool for auditing medical devices and healthcare infrastructure☆21Updated 2 years ago
- Presentations from the CX Security Labs team☆33Updated last month
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆74Updated 4 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- Modbus VCR☆27Updated 7 years ago
- ☆25Updated 2 weeks ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆35Updated 6 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- ☆69Updated 3 weeks ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- ☆73Updated 6 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- A curated list of awesome malware analysis tools and resources☆44Updated 5 years ago
- ☆17Updated 7 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year