digitalandrew / Defcon_IoT_TalkLinks
☆22Updated last year
Alternatives and similar repositories for Defcon_IoT_Talk
Users that are interested in Defcon_IoT_Talk are comparing it to the libraries listed below
Sorting:
- Bluetooth Security Assessment Methodology☆139Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆102Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆25Updated 7 months ago
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last week
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆134Updated last year
- Challenge Python☆19Updated 2 years ago
- ☆65Updated 2 years ago
- ☆24Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 10 months ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- ☆21Updated last month
- Repository of cybersecurity mindmaps☆34Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 6 months ago
- Automate Scoping, OSINT and Recon assessments.☆99Updated 3 weeks ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆59Updated 2 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 5 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆45Updated 4 months ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Apple BLE proximity pairing message spoofing☆19Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆52Updated last year
- ☆55Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆62Updated 4 months ago
- ☆16Updated 3 months ago