HomePwn - Swiss Army Knife for Pentesting of IoT Devices
☆926Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for HomePWN
Users that are interested in HomePWN are comparing it to the libraries listed below
Sorting:
- PENIOT: Penetration Testing Tool for IoT☆232Feb 22, 2022Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Attify OS - Distro for pentesting IoT devices☆1,019Aug 26, 2021Updated 4 years ago
- Drone pentesting framework console☆1,817Nov 23, 2024Updated last year
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- A Virtual environment for Pentesting IoT Devices☆442Aug 25, 2025Updated 6 months ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,465Sep 22, 2024Updated last year
- An intelligence gathering tool for hacking Bluetooth☆982Apr 23, 2023Updated 2 years ago
- A Curated list of Security Resources for all connected things☆3,206Feb 20, 2026Updated last week
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- Network Analysis Tool☆3,333Apr 10, 2023Updated 2 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,643Aug 28, 2025Updated 6 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆298Oct 2, 2019Updated 6 years ago
- Tool to deploy a post-exploitation prompt at any time☆320May 28, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆12,985Jun 10, 2025Updated 8 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- ☆128May 22, 2023Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,261Aug 24, 2022Updated 3 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- File upload vulnerability scanner and exploitation tool.☆3,301May 8, 2025Updated 9 months ago
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated last week
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,533Sep 16, 2024Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆343May 27, 2024Updated last year
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆642Dec 9, 2019Updated 6 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,092Sep 25, 2025Updated 5 months ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Automated rogue access point setup tool.☆203Apr 2, 2021Updated 4 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,773Apr 26, 2024Updated last year
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- A Modern Orchestration Engine for Security☆6,109Feb 19, 2026Updated last week
- Payload Generation Framework☆1,964Aug 21, 2024Updated last year