adi0x90 / IoT-Pentesting-Methodology
Resources to help get started with IoT Pentesting
☆166Updated 6 years ago
Alternatives and similar repositories for IoT-Pentesting-Methodology:
Users that are interested in IoT-Pentesting-Methodology are comparing it to the libraries listed below
- A Virtual environment for Pentesting IoT Devices☆421Updated 10 months ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- ☆104Updated 5 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆155Updated 4 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆221Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆117Updated 8 months ago
- Simple python script to extract unsafe functions from php projects☆197Updated 6 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- SonicWall SSL-VPN Exploit☆174Updated 4 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 5 years ago
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆145Updated 4 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆260Updated 6 years ago
- ☆66Updated 4 months ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- ☆141Updated 5 years ago
- ☆333Updated 2 years ago
- IoT Penetration Testing Cookbook, published by Packt☆117Updated 2 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆225Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆138Updated 5 years ago
- Search an exploit in the local exploitdb database by its CVE☆168Updated 2 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆125Updated 4 years ago
- This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can dail…☆169Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆140Updated 3 years ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆173Updated 3 years ago
- Web-based check for Windows privesc vulnerabilities☆138Updated last year
- Files for appsecwiki.com☆117Updated 4 years ago