akamai-threat-research / mqtt-pwn
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
☆382Updated 6 months ago
Alternatives and similar repositories for mqtt-pwn:
Users that are interested in mqtt-pwn are comparing it to the libraries listed below
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆251Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆154Updated 4 years ago
- ☆84Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 3 years ago
- the Network Protocol Fuzzer that we will want to use.☆741Updated last year
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆497Updated 2 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆780Updated 3 years ago
- ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python☆1,044Updated last year
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,014Updated 3 years ago
- Java RMI enumeration and attack tool.☆728Updated 7 years ago
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆140Updated 3 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆347Updated 2 years ago
- PENIOT: Penetration Testing Tool for IoT☆216Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358Updated 8 months ago
- SHELLING - a comprehensive OS command injection payload generator☆444Updated 4 years ago
- ☆467Updated last year
- Java Message Exploitation Tool☆498Updated 2 years ago
- Sudo Baron Samedit Exploit☆742Updated 3 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆621Updated 11 months ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆429Updated 2 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆733Updated 8 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆312Updated 5 years ago
- A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.☆826Updated 3 weeks ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆514Updated 4 years ago
- CVE-2020-5902 BIG-IP☆372Updated 3 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆406Updated 2 years ago
- Proofs-of-concept☆783Updated 5 months ago
- Kerberos Exploitation Kit☆145Updated 10 years ago
- MOGWAI LABS JMX exploitation toolkit☆200Updated last year
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆290Updated last year