digitalandrew / Defcon_IoT_TalkLinks
☆21Updated 9 months ago
Alternatives and similar repositories for Defcon_IoT_Talk
Users that are interested in Defcon_IoT_Talk are comparing it to the libraries listed below
Sorting:
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- ☆65Updated 2 years ago
- ☆34Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆23Updated 3 months ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆102Updated 11 months ago
- MayorSec DNS Enumeration Tool☆87Updated 8 months ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆42Updated last month
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆52Updated 3 weeks ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Jupyter Notebooks for the Blue Team☆36Updated 6 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated last year
- A curated checklist of tasks to be done during engagements☆32Updated 11 months ago
- Deny list generator for password filters☆26Updated last year
- ☆24Updated 6 months ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 5 months ago
- ☆17Updated 3 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆57Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago