Simple mind maps for IoT security attack surfaces and methodologies
☆17Aug 12, 2019Updated 6 years ago
Alternatives and similar repositories for IoT-Security-Attack-Surface
Users that are interested in IoT-Security-Attack-Surface are comparing it to the libraries listed below
Sorting:
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- iOS iBugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆21Apr 30, 2024Updated last year
- ☆25Nov 16, 2023Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- Windows Reverse TCP backdoor☆28Apr 28, 2019Updated 6 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆43Dec 3, 2025Updated 3 months ago
- An example of a vulnerability in the early JWT token node.js library☆37Apr 6, 2023Updated 2 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A Repository created solely for Sathyabama University Students to develop Open-Source Temper where they can add code in any language they…☆13Mar 14, 2020Updated 5 years ago
- AdGuard Home via Tailscale☆11Nov 8, 2022Updated 3 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- A curated list of awesome 🏧 hacking resources.☆17Dec 4, 2025Updated 3 months ago
- This repo hosts Terraform code for generating and analyzing Software Bill of Materials (SBOM) for Amazon ECR images. It helps identify Am…☆16Oct 18, 2023Updated 2 years ago
- A wireless infusion pump system workbench for security research☆15Jun 22, 2022Updated 3 years ago
- Powershell script to easily create new users in AD and send email confirmations☆12Nov 23, 2020Updated 5 years ago
- This is a simple MD5 Hash Cracker tool to decrypt it. The usage is :☆11Dec 29, 2018Updated 7 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- ☆15Nov 15, 2023Updated 2 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- はじめての現代制御理論の図作成_Python☆14Jun 22, 2024Updated last year