adi0x90 / IoT-Pentesting-MethodologyLinks
Resources to help get started with IoT Pentesting
☆168Updated 6 years ago
Alternatives and similar repositories for IoT-Pentesting-Methodology
Users that are interested in IoT-Pentesting-Methodology are comparing it to the libraries listed below
Sorting:
- ☆48Updated 4 years ago
- Everything you need about Burp Extension Generation☆155Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71Updated 5 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 2 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆428Updated last week
- Web-based check for Windows privesc vulnerabilities☆139Updated 2 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆157Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can dail…☆172Updated last year
- ☆104Updated 5 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆188Updated last year
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆221Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- useful pentest note☆66Updated last week
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆199Updated last month
- ☆47Updated 5 years ago
- Search an exploit in the local exploitdb database by its CVE☆173Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- ☆69Updated 9 months ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- ☆148Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆147Updated 4 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆67Updated 5 months ago
- learning case to prepare OSWE☆37Updated 5 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago