arthastang / IoT-Implant-ToolkitView external linksLinks
Toolkit for implant attack of IoT devices
☆137Sep 6, 2018Updated 7 years ago
Alternatives and similar repositories for IoT-Implant-Toolkit
Users that are interested in IoT-Implant-Toolkit are comparing it to the libraries listed below
Sorting:
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Mar 12, 2020Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 6 months ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Nov 12, 2022Updated 3 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆335Mar 6, 2019Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Tool to deploy a post-exploitation prompt at any time☆320May 28, 2021Updated 4 years ago
- ☆14Sep 13, 2018Updated 7 years ago
- Framework for exploiting local vulnerabilities☆84Nov 18, 2023Updated 2 years ago
- ☆94Aug 17, 2020Updated 5 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆921Dec 27, 2022Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆679Apr 17, 2019Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆161Jan 31, 2018Updated 8 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- ☆106May 28, 2021Updated 4 years ago
- Attify OS - Distro for pentesting IoT devices☆1,017Aug 26, 2021Updated 4 years ago
- Security analysis toolkit for proprietary car protocols☆785Feb 21, 2022Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Mar 27, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A backdoor with a multitude of features.☆291Oct 3, 2024Updated last year
- WiFi Enabled USB Rubber Ducky☆152Dec 17, 2016Updated 9 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️☆285Oct 18, 2023Updated 2 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago