HomePwn - Swiss Army Knife for Pentesting of IoT Devices
☆931Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for HomePWN
Users that are interested in HomePWN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PENIOT: Penetration Testing Tool for IoT☆231Feb 22, 2022Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Attify OS - Distro for pentesting IoT devices☆1,025Aug 26, 2021Updated 4 years ago
- A Virtual environment for Pentesting IoT Devices☆444Aug 25, 2025Updated 7 months ago
- Drone pentesting framework console☆1,892Nov 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An intelligence gathering tool for hacking Bluetooth☆995Apr 23, 2023Updated 2 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,478Sep 22, 2024Updated last year
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆326Nov 23, 2021Updated 4 years ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Network Analysis Tool☆3,345Apr 10, 2023Updated 2 years ago
- A Curated list of Security Resources for all connected things☆3,232Mar 7, 2026Updated last month
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,106Sep 25, 2025Updated 6 months ago
- A simple embedded Linux backdoor.☆200Oct 25, 2020Updated 5 years ago
- gather gather gather☆584Mar 15, 2025Updated last year
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆346May 27, 2024Updated last year
- Airdrop Crazy☆58May 15, 2020Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆128May 22, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,654Aug 28, 2025Updated 7 months ago
- File upload vulnerability scanner and exploitation tool.☆3,306May 8, 2025Updated 11 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,549Sep 16, 2024Updated last year
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆819Jan 31, 2022Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆161Oct 21, 2020Updated 5 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,792Apr 26, 2024Updated last year
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆300Oct 2, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,180Updated this week
- A Collection of Hacks in IoT Space so that we can address them (hopefully).☆2,407May 16, 2020Updated 5 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,560Oct 16, 2025Updated 5 months ago
- A curated list of awesome embedded and IoT security resources.☆2,282Oct 17, 2023Updated 2 years ago