daniellowrie / IoT-Hacking-ResourcesView external linksLinks
A list of hacking/security resources that are focused on IoT
☆62Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for IoT-Hacking-Resources
Users that are interested in IoT-Hacking-Resources are comparing it to the libraries listed below
Sorting:
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- Oceantoo is an XOR/LFSR based encryption algorithm☆17Mar 7, 2022Updated 3 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Sep 3, 2022Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Sep 15, 2023Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Use CMSTP.exe to bypass UAC.☆52Jun 24, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆29Mar 4, 2025Updated 11 months ago
- A Collection of Wordlists for Penetration Testing☆33Dec 13, 2025Updated 2 months ago
- ☆25Feb 9, 2022Updated 4 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 3 months ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- A Proof of Concept for Clickjacking Attacks☆69Jan 30, 2021Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- A zygisk module that dumps so file from process memory☆94Oct 9, 2024Updated last year
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- ☆32Jun 12, 2024Updated last year
- Replace the .txt section of the current loaded modules from \KnownDlls\☆305Sep 28, 2022Updated 3 years ago
- ☆412Dec 14, 2023Updated 2 years ago
- Tools for fuzzing RDP☆132Aug 30, 2021Updated 4 years ago
- Collection of scripts and CMake files to easily link to LLVM into your project (Windows, Linux, macOS).☆43Apr 2, 2025Updated 10 months ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Jun 6, 2024Updated last year
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- WTSRM☆216Aug 7, 2022Updated 3 years ago
- Tool to start processes as SYSTEM using token duplication☆38Oct 27, 2020Updated 5 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- ☆37Sep 28, 2021Updated 4 years ago