A list of hacking/security resources that are focused on IoT
☆62Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for IoT-Hacking-Resources
Users that are interested in IoT-Hacking-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- this tool can deploy malware using wifi that it can be downloaded by the user.☆13Dec 16, 2023Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 3 years ago
- ☆36Nov 26, 2024Updated last year
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆17Oct 31, 2022Updated 3 years ago
- x3CTF Challenges 2025☆16Jan 26, 2025Updated last year
- dedsec is a hacking framework filled with hacking tools that you can use directly in the script☆28Nov 16, 2019Updated 6 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Use CMSTP.exe to bypass UAC.☆51Jun 24, 2022Updated 3 years ago
- ☆37Sep 28, 2021Updated 4 years ago
- A guide to hosting a website from your home using an Orange Pi Zero 2W, Ubuntu, and Apache☆15Jun 14, 2024Updated last year
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- defender_database☆25Oct 31, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Ded Security Framework is a tool aimed at security professionals☆35May 12, 2024Updated last year
- Winbindex bot to pull in binaries for specific releases☆49Sep 15, 2023Updated 2 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Infosec Compilation is an information security repository for offensive, defensive, and purple-teaming resources, along with guides desig…☆23Dec 14, 2022Updated 3 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Sep 3, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆16Jan 8, 2021Updated 5 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆46Apr 14, 2018Updated 7 years ago
- It's pointy and it hurts!☆126Oct 18, 2022Updated 3 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆115Nov 19, 2022Updated 3 years ago
- Replace the .txt section of the current loaded modules from \KnownDlls\☆304Sep 28, 2022Updated 3 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- А simple task manager that was created for windows to help stop viruses.☆14Mar 29, 2025Updated last year
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- Tools for fuzzing RDP☆133Aug 30, 2021Updated 4 years ago