NVISOsecurity / IOXYLinks
MQTT intercepting proxy
☆138Updated last year
Alternatives and similar repositories for IOXY
Users that are interested in IOXY are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- ☆105Updated 2 years ago
- Artifacts for the Black Hat talk.☆105Updated 4 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- Burp with Friends☆103Updated 2 years ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆241Updated this week
- A "SIP Torture" (RFC 4475) testing framework.☆65Updated 2 years ago
- ☆148Updated 3 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆71Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- A ZigBee hacking toolkit by Bishop Fox☆283Updated 3 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- A GraphQL enumeration and extraction tool☆132Updated 2 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆106Updated last week
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆106Updated 2 years ago
- ☆101Updated 8 months ago
- Vulnerability☆32Updated 3 months ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆296Updated 2 weeks ago
- Identify IP addresses owned by public cloud providers☆125Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆88Updated 2 years ago
- ☆166Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆105Updated 2 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆68Updated 3 years ago