adi0x90 / attifyos
Attify OS - Distro for pentesting IoT devices
☆984Updated 3 years ago
Alternatives and similar repositories for attifyos
Users that are interested in attifyos are comparing it to the libraries listed below
Sorting:
- Script for searching the extracted firmware file system for goodies!☆1,121Updated last year
- The Damn Vulnerable Router Firmware Project☆687Updated 4 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,426Updated 8 months ago
- Firmware Analysis and Comparison Tool☆1,330Updated last week
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,927Updated 9 months ago
- A Bluetooth low energy capture the flag☆697Updated 9 months ago
- ☆609Updated 2 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,127Updated last year
- EMUX Firmware Emulation Framework (formerly ARMX)☆745Updated this week
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆765Updated 5 months ago
- ☆1,153Updated 8 years ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆843Updated last month
- Linux Exploit Suggester; based on operating system release number☆1,788Updated 10 years ago
- Vulnerability Labs for security analysis☆1,171Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- A collection of links related to VMware escape exploits☆1,421Updated 8 months ago
- A handy collection of my public exploits, all in one place.☆608Updated 3 weeks ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,106Updated 3 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆478Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆420Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 3 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆455Updated 2 years ago
- My proof-of-concept exploits for the Linux kernel☆1,471Updated 3 years ago
- Payload Development Framework☆744Updated this week
- the Network Protocol Fuzzer that we will want to use.☆758Updated last year
- ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python☆1,062Updated last year
- Proof of Concepts☆1,255Updated 6 months ago
- A fork and successor of the Sulley Fuzzing Framework☆2,153Updated 2 weeks ago