Telefonica / HomePWNLinks
HomePwn - Swiss Army Knife for Pentesting of IoT Devices
☆920Updated 3 years ago
Alternatives and similar repositories for HomePWN
Users that are interested in HomePWN are comparing it to the libraries listed below
Sorting:
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,749Updated last month
- caplets and proxy modules.☆513Updated 10 months ago
- A Virtual environment for Pentesting IoT Devices☆442Updated 5 months ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,230Updated 3 years ago
- MSFvenom Payload Creator (MSFPC)☆1,310Updated 4 years ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆749Updated 5 months ago
- Attify OS - Distro for pentesting IoT devices☆1,018Updated 4 years ago
- Automation library for Metasploit☆407Updated 6 months ago
- bettercap's web UI☆356Updated 5 months ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610Updated 4 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆556Updated 6 years ago
- An intelligence gathering tool for hacking Bluetooth☆975Updated 2 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,054Updated last year
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆408Updated 3 years ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆454Updated last year
- Devkit for building Metasploit-like consoles☆252Updated 4 months ago
- Bluetooth hacking tools☆472Updated 2 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆461Updated this week
- Capture handshakes of nearby WiFi networks automatically☆775Updated 4 years ago
- List of Bluetooth BR/EDR/LE security resources☆589Updated 4 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,455Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,796Updated this week
- Python antivirus evasion tool☆1,448Updated 2 years ago
- JackIt - Exploit Code for Mousejack☆886Updated 5 years ago
- Find exploits in local and online databases instantly☆1,807Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,742Updated last year
- Red Team Tool Kit☆1,133Updated 3 years ago
- All MITM attacks in one place.☆1,018Updated 4 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆635Updated last month
- Image Payload Creating/Injecting tools☆1,285Updated 2 years ago