A tool for malicious behavior detection in IoT devices
☆77Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for IoT-Home-Guard
Users that are interested in IoT-Home-Guard are comparing it to the libraries listed below
Sorting:
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Nov 12, 2022Updated 3 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Hackmelock Android application☆17Apr 11, 2017Updated 8 years ago
- 常用蓝牙漏洞CVE poc、EXP☆38Aug 22, 2018Updated 7 years ago
- IoT漏洞检测平台,支持固件第三方库版本分析。移动安全相关功能移至SecMobile。☆115Jun 22, 2020Updated 5 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 3 weeks ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Hackmelock emulator device using node.js bleno☆27Sep 21, 2017Updated 8 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- A malware analysis and classification tool.☆190Dec 3, 2021Updated 4 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Software for the QO-100 groundstation of EA4GPZ☆10Aug 8, 2022Updated 3 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- 雪碧0xroot init3@0xroot.cn☆20Nov 1, 2019Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- Unofficial api for cve.mitre.org☆40Aug 28, 2021Updated 4 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- ☆25May 9, 2021Updated 4 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆12Nov 11, 2015Updated 10 years ago
- Automated Deployment for MobileInsight Development Environment☆10Dec 19, 2020Updated 5 years ago
- ☆10Jan 15, 2021Updated 5 years ago
- Windows操作系统版本检测工具,如果网络可达,Windows Server 2003 R2及其以上版本的 操作系统版本识别率理论上能达以100%☆11Mar 12, 2020Updated 5 years ago
- Mini PCI Express GPS module☆11Jan 19, 2022Updated 4 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.☆114Nov 14, 2023Updated 2 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆174Jan 29, 2026Updated last month
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago