akamai-threat-research / mqtt-pwnLinks
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
☆406Updated 10 months ago
Alternatives and similar repositories for mqtt-pwn
Users that are interested in mqtt-pwn are comparing it to the libraries listed below
Sorting:
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆252Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆521Updated 4 years ago
- Advanced Burp Suite Logging Extension☆667Updated last year
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆507Updated 3 years ago
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆141Updated 4 years ago
- Java RMI enumeration and attack tool.☆734Updated 7 years ago
- ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python☆1,067Updated last year
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆291Updated 2 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆348Updated 2 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,034Updated 4 years ago
- ☆472Updated last year
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆603Updated 6 years ago
- SHELLING - a comprehensive OS command injection payload generator☆445Updated 5 years ago
- Automated HTTP Request Repeating With Burp Suite☆877Updated 3 years ago
- MySQL fake server for read files of connected clients☆599Updated 7 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆465Updated 7 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆251Updated 6 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆421Updated 3 years ago
- PENIOT: Penetration Testing Tool for IoT☆222Updated 3 years ago
- Burp Extension for a passive scanning JS files for endpoint links.☆788Updated last year
- Lab for exploring SSRF vulnerabilities☆246Updated 4 years ago
- A list of useful payloads for Web Application Security and Pentest/CTF☆304Updated 10 months ago
- DNS rebinding toolkit☆253Updated 2 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- ☆83Updated 4 years ago
- ☆406Updated 3 years ago
- EPSS & VEDAS Score Aggregator for CVEs☆243Updated this week