MQTT intercepting proxy
☆143Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for IOXY
Users that are interested in IOXY are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.☆23Dec 14, 2021Updated 4 years ago
- Subvenkon is a subdomain enumerator from Venkon☆22Jun 22, 2020Updated 5 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A substitute repository put up on public demand for the original Awesome WAF repository (https://github.com/0xInfection/Awesome-WAF) whic…☆12May 3, 2019Updated 6 years ago
- ☆30Jun 27, 2022Updated 3 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Jul 19, 2021Updated 4 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 5 months ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- Tool to check for applicable windows updates for a given machine in offline without dependency on WSUS or WUA.☆11Sep 23, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Load nested directory structures as ansible facts.☆19Mar 13, 2019Updated 7 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 4 months ago
- Inspect MQTT over TLS traffic with ease!☆49Jan 23, 2025Updated last year
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Apr 26, 2025Updated 11 months ago
- PE .exe packer and manual loader for Windows with compression, encryption, and much more☆56Sep 5, 2025Updated 6 months ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆63Apr 17, 2020Updated 5 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆65Apr 13, 2021Updated 4 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Application to understand narrow recon☆20Feb 18, 2025Updated last year
- CVE-2025-31324, SAP Exploit☆25Apr 28, 2025Updated 11 months ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- Built on a lazy Sunday after seeing this tweet (https://twitter.com/intigriti/status/1272145863868104705?s=20) I present to you, Paramete…☆51Jun 14, 2020Updated 5 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago
- Hardware Security Research and Serial Communication tool (to be used with Attify Badge)☆23Aug 16, 2022Updated 3 years ago
- Use grepaddr to extract (grep) all kinds of addresses from stdin like URLs (incl. IPv4/IPv6), IP addresses & ranges (IPv4/IPv6), e-mail a…☆66Aug 7, 2023Updated 2 years ago