Resources to help get started with IoT Pentesting
☆169Nov 10, 2018Updated 7 years ago
Alternatives and similar repositories for IoT-Pentesting-Methodology
Users that are interested in IoT-Pentesting-Methodology are comparing it to the libraries listed below
Sorting:
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Attify OS - Distro for pentesting IoT devices☆1,020Aug 26, 2021Updated 4 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆279Aug 4, 2021Updated 4 years ago
- ICMP command & control☆21Apr 6, 2021Updated 4 years ago
- Tunnel SSH and other protocols over HTTP☆29Apr 22, 2017Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Install Burpsuite pro in Linux OS☆17Mar 24, 2024Updated last year
- ☆20May 20, 2019Updated 6 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆42Jan 4, 2018Updated 8 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 4 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- A golang package for retrieving values from the Microsoft LDAP property, `UserAccountControl`☆16Oct 28, 2021Updated 4 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- A Curated list of Security Resources for all connected things☆3,210Mar 7, 2026Updated 2 weeks ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆479Nov 11, 2021Updated 4 years ago
- Web Service write in Python for control and protect your android device remotely.☆191Dec 14, 2022Updated 3 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆133Feb 11, 2022Updated 4 years ago