NVISOsecurity / IOXYLinks
MQTT intercepting proxy
☆144Updated 2 months ago
Alternatives and similar repositories for IOXY
Users that are interested in IOXY are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- ☆106Updated 3 years ago
- A logging DNS and HTTP(S) server. Opensource alternative to some parts of the Burpsuite Collaborator server.☆38Updated 8 years ago
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- a smart DNS response-guided subdomain fuzzer☆156Updated 3 years ago
- Tools to assess DNS security.☆153Updated last year
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- ☆71Updated 5 months ago
- Burp with Friends☆103Updated 3 years ago
- A ZigBee hacking toolkit by Bishop Fox☆287Updated 4 years ago
- ☆148Updated 3 years ago
- Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in …☆206Updated 2 years ago
- Application and Service Fingerprinting☆132Updated 3 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆211Updated 5 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆105Updated 2 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆39Updated 2 months ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆102Updated 2 years ago
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- Security tools report parsers for Faradaysec.com☆57Updated last week
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Predict Mongo ObjectIds☆151Updated 7 years ago
- Vulnerability☆32Updated 3 months ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Updated 6 months ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago