digitalandrew / Defcon_IoT_TalkLinks
☆22Updated last year
Alternatives and similar repositories for Defcon_IoT_Talk
Users that are interested in Defcon_IoT_Talk are comparing it to the libraries listed below
Sorting:
- ☆65Updated 2 years ago
- Bluetooth Security Assessment Methodology☆147Updated 3 weeks ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆26Updated 9 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- MayorSec DNS Enumeration Tool☆89Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆103Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆107Updated 11 months ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆61Updated 2 years ago
- ☆24Updated 11 months ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 8 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- ☆34Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- Deny list generator for password filters☆26Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- ☆76Updated last year
- ☆24Updated 9 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 5 years ago
- ☆22Updated 3 months ago
- Hacking Notes☆38Updated 3 months ago
- Apple BLE proximity pairing message spoofing☆19Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆101Updated last year
- ☆55Updated last year
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆183Updated last month