akamai-threat-research / mqtt-pwn
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
☆379Updated 5 months ago
Alternatives and similar repositories for mqtt-pwn:
Users that are interested in mqtt-pwn are comparing it to the libraries listed below
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆248Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆153Updated 4 years ago
- the Network Protocol Fuzzer that we will want to use.☆738Updated 11 months ago
- Advanced Burp Suite Logging Extension☆636Updated 7 months ago
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆141Updated 3 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆592Updated 3 years ago
- ☆86Updated 4 years ago
- Java RMI enumeration and attack tool.☆724Updated 7 years ago
- A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.☆816Updated 2 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆398Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆357Updated 7 months ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆497Updated 2 years ago
- A list of useful payloads for Web Application Security and Pentest/CTF☆296Updated 5 months ago
- PENIOT: Penetration Testing Tool for IoT☆213Updated 2 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Updated 2 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆312Updated 5 years ago
- ☆467Updated last year
- Redis 4.x & 5.x RCE☆139Updated 5 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆424Updated 2 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆732Updated 8 years ago
- CVE-2020-5902 BIG-IP☆371Updated 3 years ago
- Search an exploit in the local exploitdb database by its CVE☆168Updated 2 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆778Updated 3 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆618Updated 10 months ago
- Proofs-of-concept☆779Updated 4 months ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,009Updated 3 years ago
- AttifyOS 4.0☆72Updated 8 months ago
- JWT Support for Burp☆249Updated 5 months ago
- Attify OS - Distro for pentesting IoT devices☆960Updated 3 years ago