IoT-PTv / IoT-Dorks
Useful dorks from google,shodan,zoomeye,onphye
☆9Updated 4 years ago
Alternatives and similar repositories for IoT-Dorks:
Users that are interested in IoT-Dorks are comparing it to the libraries listed below
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links…☆39Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- ☆16Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆17Updated last year
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆20Updated 11 months ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- https://www.nu11secur1ty.com☆23Updated 2 weeks ago
- It contain google dork to find the wsdl file.☆13Updated 4 years ago
- Ruby ARP Toolkit☆14Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆13Updated 2 weeks ago
- NVD semiupdated database to be used with CVEScannerV2☆14Updated 2 weeks ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆12Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago