IoT-PTv / IoT-Dorks
Useful dorks from google,shodan,zoomeye,onphye
☆9Updated 4 years ago
Alternatives and similar repositories for IoT-Dorks:
Users that are interested in IoT-Dorks are comparing it to the libraries listed below
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Updated 2 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆41Updated last year
- fsp - Firestore Database Vulnerability Scanner Using APKs☆62Updated 3 years ago
- ☆31Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Payloads and Lists☆20Updated 5 years ago
- Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links…☆39Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- ☆20Updated 2 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆12Updated 2 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆19Updated 5 years ago
- Open Redirect Vulnerability Payload List☆12Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- NVD semiupdated database to be used with CVEScannerV2☆13Updated this week
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆16Updated last year
- ☆13Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 2 months ago