akamai-threat-research / mqtt-pwn
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
☆384Updated 7 months ago
Alternatives and similar repositories for mqtt-pwn:
Users that are interested in mqtt-pwn are comparing it to the libraries listed below
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆253Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 4 years ago
- EmbedOS - Embedded security testing virtual machine☆155Updated 4 years ago
- Java RMI enumeration and attack tool.☆730Updated 7 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,020Updated 3 years ago
- Burp Extension for a passive scanning JS files for endpoint links.☆772Updated last year
- Automated HTTP Request Repeating With Burp Suite☆869Updated 3 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆780Updated 3 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆836Updated this week
- ☆469Updated last year
- Advanced Burp Suite Logging Extension☆650Updated 10 months ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆237Updated 4 months ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆602Updated 5 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358Updated 9 months ago
- Proofs-of-concept☆786Updated 6 months ago
- ☆130Updated last week
- ☆83Updated 4 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆516Updated 4 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆500Updated 3 years ago
- ☆402Updated 3 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆575Updated 3 years ago
- Monitoring exploits & references for CVEs☆229Updated last year
- Sudo Baron Samedit Exploit☆743Updated 3 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆347Updated 2 years ago
- HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite☆725Updated 3 years ago
- A static byte code analyzer for Java deserialization gadget research☆241Updated 7 years ago
- Attify OS - Distro for pentesting IoT devices☆974Updated 3 years ago
- Redis(<=5.0.5) RCE☆1,038Updated last year
- Java RMI Vulnerability Scanner☆854Updated 8 months ago
- J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tes…☆651Updated last year