Set of tools for security testing of Internet of Things devices using specific network IoT protocols
☆358May 31, 2024Updated last year
Alternatives and similar repositories for cotopaxi
Users that are interested in cotopaxi are comparing it to the libraries listed below
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Phishing Framework for Pentesters☆201May 16, 2023Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆256Apr 6, 2024Updated last year
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 10 months ago
- Firmware Analysis and Comparison Tool☆1,420Feb 19, 2026Updated last week
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- Cisco Implant Raspberry Controlled Operations☆51May 23, 2023Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Apr 20, 2021Updated 4 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- ☆627Jan 20, 2023Updated 3 years ago
- Hackmelock Android application☆17Apr 11, 2017Updated 8 years ago
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆432Aug 9, 2024Updated last year
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆836Aug 22, 2025Updated 6 months ago
- A Curated list of Security Resources for all connected things☆3,206Feb 20, 2026Updated last week
- Security analysis toolkit for proprietary car protocols☆785Feb 21, 2022Updated 4 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,316Feb 15, 2026Updated 2 weeks ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,046Jul 21, 2024Updated last year
- IEEE 802.15.4/ZigBee Security Research Toolkit☆832Sep 12, 2023Updated 2 years ago
- Unlocking Serverless Computing to Assess Security Controls☆261Mar 15, 2024Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- A Virtual environment for Pentesting IoT Devices☆443Aug 25, 2025Updated 6 months ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- Raw binary firmware analysis software☆569Jun 6, 2024Updated last year
- Read only mirror - No pull requests☆20May 7, 2021Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆443Oct 5, 2025Updated 4 months ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Hackmelock emulator device using node.js bleno☆27Sep 21, 2017Updated 8 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆867Oct 5, 2025Updated 4 months ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,215Feb 3, 2025Updated last year