Joshua1909 / smodLinks
smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol
☆19Updated 6 years ago
Alternatives and similar repositories for smod
Users that are interested in smod are comparing it to the libraries listed below
Sorting:
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆239Updated 5 months ago
- A full-featured open-source Wi-Fi fuzzer☆194Updated 2 months ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- ☆113Updated last year
- ☆96Updated 3 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- MODBUS Penetration Testing Framework☆83Updated 9 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆431Updated 3 years ago
- USB testing made easy☆116Updated 2 years ago
- ☆17Updated 7 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Linux kernel exploits for local privilege escalation☆79Updated 7 years ago
- ☆69Updated 3 weeks ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- ☆54Updated 5 years ago
- Scapy hands-on☆34Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆32Updated last month
- ☆77Updated 8 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago
- Collected && Written N day Vulns for study purpose only☆105Updated 2 months ago
- Scripts I used during CTP☆67Updated 5 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆74Updated 4 years ago
- Siemens SIMATIC vulnerabilities☆22Updated 3 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Updated 5 years ago
- ☆206Updated 10 months ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago