domienschepers / wifi-framework
Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
☆215Updated last year
Related projects: ⓘ
- A full-featured open-source Wi-Fi fuzzer☆172Updated 2 weeks ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆292Updated 3 months ago
- ☆273Updated 2 years ago
- Bluetooth Security Assessment Methodology☆106Updated 3 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆306Updated last month
- ☆197Updated last year
- An automatic Blind ROP exploitation tool☆186Updated last year
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆141Updated 5 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆214Updated last year
- Common python and scapy scripts for Wi-Fi☆58Updated 4 months ago
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆175Updated last week
- ☆241Updated this week
- Hack-A-Sat Qualifiers Writeups☆219Updated last year
- ☆122Updated 10 months ago
- Resources to help get started with IoT Pentesting☆164Updated 5 years ago
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆20Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆43Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆103Updated 6 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆81Updated last year
- A Virtual environment for Pentesting IoT Devices☆414Updated 5 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆139Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆236Updated 7 months ago
- ☆208Updated 5 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆120Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆101Updated last year
- PENIOT: Penetration Testing Tool for IoT☆205Updated 2 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆370Updated 2 years ago
- This contains a list of tools for security assessments of android applications.☆12Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆127Updated 4 months ago
- ☆101Updated last month