This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.
☆12Nov 23, 2016Updated 9 years ago
Alternatives and similar repositories for zigbee-security-exploitation
Users that are interested in zigbee-security-exploitation are comparing it to the libraries listed below
Sorting:
- GUI Framework on top of Killerbee☆84Apr 25, 2017Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Ruby library for interacting with Bugcrowd's VRT☆14Aug 19, 2025Updated 6 months ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 10 months ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 weeks ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Feb 22, 2021Updated 5 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Encode and decode 26-bit, 34-bit, or 38-bit Wiegand protocol credentials for communicating with access control systems in TypeScript or J…☆12Sep 3, 2024Updated last year
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- ☆36Nov 9, 2025Updated 3 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- The currently released SimpleRisk source code.☆100Nov 22, 2025Updated 3 months ago
- Havoc python api☆45May 23, 2023Updated 2 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- C# web scraper which targets chaturbate.com☆12Sep 14, 2018Updated 7 years ago
- Simple Docker definition to serve mocked APIs from static JSON files.☆11Apr 27, 2018Updated 7 years ago
- Laravel 学习心得☆13Nov 3, 2016Updated 9 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- ☆10Nov 11, 2016Updated 9 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Autoclicker program for Stronghold Crusader. Sends Win API messages to the game window.☆12Jun 21, 2020Updated 5 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- KiwiVM Control Panel☆11May 11, 2017Updated 8 years ago
- A GPT-based chatbot who knows the content of your Confluence wiki.☆14Apr 22, 2025Updated 10 months ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Tool for beginners to install alternc on their server☆16Nov 21, 2023Updated 2 years ago
- Research into Pixmob's IR LED concert bracelets☆12Jan 31, 2025Updated last year
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Arch Linux dotfiles☆10Oct 31, 2024Updated last year
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago