AlgoSecure / iotmap
Research project on heterogeneous IoT protocols modelling
☆54Updated 3 years ago
Alternatives and similar repositories for iotmap:
Users that are interested in iotmap are comparing it to the libraries listed below
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- Python3 Metasploit automation library☆21Updated 2 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 5 years ago
- ☆25Updated 3 years ago
- My fuzzing workshop from PHDays9☆26Updated 5 years ago
- ☆38Updated 4 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 8 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- A curated list of awesome malware analysis tools and resources☆44Updated 4 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- ☆24Updated 11 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- ☆13Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- SNIcat☆126Updated 3 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Telco training☆26Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago