akamai-threat-research / mqtt-pwnLinks
MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
☆427Updated last year
Alternatives and similar repositories for mqtt-pwn
Users that are interested in mqtt-pwn are comparing it to the libraries listed below
Sorting:
- EmbedOS - Embedded security testing virtual machine☆156Updated 5 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆251Updated 5 years ago
- AttifyOS 4.0☆89Updated last year
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆517Updated 3 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,063Updated 4 years ago
- Attify OS - Distro for pentesting IoT devices☆1,010Updated 4 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆879Updated 4 months ago
- ☆88Updated 5 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆796Updated 3 years ago
- ☆474Updated 2 years ago
- ☆132Updated last month
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆609Updated 4 years ago
- MySQL fake server for read files of connected clients☆600Updated 8 years ago
- Java RMI enumeration and attack tool.☆743Updated 8 years ago
- Proofs-of-concept