adi0x90 / IoT-Pentesting-MethodologyLinks
Resources to help get started with IoT Pentesting
☆169Updated 7 years ago
Alternatives and similar repositories for IoT-Pentesting-Methodology
Users that are interested in IoT-Pentesting-Methodology are comparing it to the libraries listed below
Sorting:
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆158Updated 4 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆123Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can dail…☆174Updated last year
- Web-based check for Windows privesc vulnerabilities☆140Updated 2 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- useful pentest note☆68Updated 2 weeks ago
- Search an exploit in the local exploitdb database by its CVE☆172Updated 3 years ago
- ☆48Updated 4 years ago
- Everything you need about Burp Extension Generation☆157Updated 2 years ago
- ☆48Updated 6 years ago
- ☆70Updated 3 months ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71Updated 5 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆178Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- Clone me and get your own authentic Parsia-Clone today.☆46Updated last month
- Notes I've taken while working through various web app pentesting labs.☆91Updated 7 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- CISCO CVE-2020-3452 Scanner & Exploiter☆100Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆437Updated 3 months ago
- Proof of concept for CVE-2020-5902☆72Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Updated 5 years ago