Simple mind maps for IoT security attack surfaces and methodologies
☆17Aug 12, 2019Updated 6 years ago
Alternatives and similar repositories for IoT-Security-Attack-Surface
Users that are interested in IoT-Security-Attack-Surface are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- iOS iBugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆21Apr 30, 2024Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆25Nov 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Building a Go REST API using Gorm and Fiber!☆12Apr 30, 2022Updated 3 years ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Android Testing☆16Mar 24, 2014Updated 12 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Rats sources☆10Feb 23, 2022Updated 4 years ago
- ☆11May 18, 2018Updated 7 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- This repo hosts Terraform code for generating and analyzing Software Bill of Materials (SBOM) for Amazon ECR images. It helps identify Am…☆16Oct 18, 2023Updated 2 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AWS LocalStack + Spark Cluster + Zeppelin [Docker]☆10Jul 6, 2022Updated 3 years ago
- vault-consul-swarm-cluster☆10Aug 18, 2018Updated 7 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- Configuration files for Unbound as a caching DNS server with DNSSEC validation and DNS over TLS forwarding.☆13Jan 13, 2019Updated 7 years ago
- ☆15Nov 15, 2023Updated 2 years ago
- FastJsonAutoTypeBypass☆16Apr 14, 2021Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Exemplos em PHP dos 23 Padrões de Projetos (Design Patterns) relacionados ao Livro GOF☆11Dec 31, 2021Updated 4 years ago
- A curated list of awesome 🏧 hacking resources.☆20Dec 4, 2025Updated 3 months ago
- Terraform Azure Verified Resource Module for Network Security Group☆17Mar 18, 2026Updated last week
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 7 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- ☆15Mar 21, 2025Updated last year