akamai-threat-research / mqtt-pwnLinks
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
☆428Updated last year
Alternatives and similar repositories for mqtt-pwn
Users that are interested in mqtt-pwn are comparing it to the libraries listed below
Sorting:
- EmbedOS - Embedded security testing virtual machine☆159Updated 5 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆255Updated 5 years ago
- Attify OS - Distro for pentesting IoT devices☆1,016Updated 4 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆518Updated 3 years ago
- ☆131Updated 4 months ago
- Java RMI enumeration and attack tool.☆742Updated 8 years ago
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆142Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- When MVC magic turns black☆296Updated 5 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆799Updated 4 years ago
- A list of useful payloads for Web Application Security and Pentest/CTF☆310Updated last year
- AttifyOS 4.0☆90Updated last year
- ☆89Updated 5 years ago
- Ubuntu OverlayFS Local Privesc☆433Updated last year
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆519Updated 5 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆887Updated 7 months ago
- Copy as requests plugin for Burp Suite☆67Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Updated 4 years ago
- Dockerfiles of CTF Challenges running on SniperOJ☆153Updated 2 years ago
- ☆476Updated 2 years ago
- Crack the shared secret of a HS256-signed JWT☆255Updated 2 years ago
- Proofs-of-concept☆821Updated last year
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,075Updated 4 years ago
- 消费级物联网安全基线☆176Updated last year
- Rogue MySql Server☆473Updated 12 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆345Updated 3 years ago
- Redis 4.x & 5.x RCE☆143Updated 6 years ago
- MySQL fake server for read files of connected clients☆607Updated 8 years ago
- Multi-language web CGI interfaces exploits.☆399Updated 3 years ago
- Advanced Burp Suite Logging Extension☆689Updated last year