A tool for malicious behavior detection in IoT devices
☆77Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for IoT-Home-Guard
Users that are interested in IoT-Home-Guard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Nov 12, 2022Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- 常用蓝牙漏洞CVE poc、EXP☆37Aug 22, 2018Updated 7 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361May 31, 2024Updated last year
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 months ago
- IoT漏洞检测平台,支持固件第三方库版本分析。移动安全相关功能移至SecMobile。☆116Jun 22, 2020Updated 5 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Aug 9, 2018Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Jan 29, 2019Updated 7 years ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆12Nov 11, 2015Updated 10 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- Exp of cve-2019-12272☆20Jul 10, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 6 months ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,552Sep 16, 2024Updated last year
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆21May 9, 2019Updated 7 years ago
- Automated 802.1x Bypass☆89Mar 11, 2020Updated 6 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- dns rebind tool with custom scripts☆85Apr 5, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆21Dec 22, 2020Updated 5 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆175Jan 29, 2026Updated 3 months ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- ☆29Nov 30, 2018Updated 7 years ago
- ☆94Aug 17, 2020Updated 5 years ago