cougarbytes / IoT-Security-Attack-SurfaceLinks
Simple mind maps for IoT security attack surfaces and methodologies
☆15Updated 5 years ago
Alternatives and similar repositories for IoT-Security-Attack-Surface
Users that are interested in IoT-Security-Attack-Surface are comparing it to the libraries listed below
Sorting:
- ☆15Updated 4 years ago
- URL-encode data streams via commandline☆14Updated 5 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆27Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Virtual Security Operations Center☆51Updated last year
- ☆49Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- ☆1Updated 4 years ago
- Security checks for your researches☆34Updated 4 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Wordlists for intelligent directory brute-forcing☆31Updated 3 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- AWS Security Checks☆39Updated 7 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆52Updated 5 months ago
- Common Wordlists☆54Updated 8 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Updated 9 months ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- ☆28Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- All in one port scanning script.☆68Updated 5 years ago
- ☆47Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- ☆23Updated 2 years ago