AlgoSecure / iotmapLinks
Research project on heterogeneous IoT protocols modelling
☆54Updated 3 years ago
Alternatives and similar repositories for iotmap
Users that are interested in iotmap are comparing it to the libraries listed below
Sorting:
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆25Updated last year
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- ☆25Updated last year
- Static Token And Credential Scanner☆96Updated 2 years ago
- Telco training☆26Updated 6 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆74Updated 4 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 2 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 6 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Presentations from the CX Security Labs team☆33Updated 2 weeks ago
- Dockerfiles for (un)popular fuzzers!☆30Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆18Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- ☆74Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Some of my public exploits☆51Updated 4 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- PDML importer for Burp Suite☆28Updated 4 years ago