-notes and scripts for online course OffIOT
☆12Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for Offensive_IOT_Exploitation
Users that are interested in Offensive_IOT_Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- webOS support library that can be used on its own, outside of Enyo or Cordova☆18Feb 2, 2018Updated 8 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆20Oct 21, 2012Updated 13 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- A bidirectional GRU model to detect discrete emotions in tweets.☆22Jul 22, 2020Updated 5 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Automated fuzzing framework☆120Feb 2, 2023Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Force link all static lib symbols into .exe target, for full code coverage measure on windows.☆15Jun 14, 2015Updated 10 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Jun 1, 2014Updated 11 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Marlin arduino firmware for 'Make your own Ceramic 3D Printer'☆17Jun 24, 2022Updated 3 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆11Jun 11, 2025Updated 9 months ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- Python Packet Capture☆11Jan 16, 2015Updated 11 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- free5GC official site☆14Mar 10, 2026Updated 2 weeks ago
- A suggested path for learning Vim's scripting language, VimL☆21Jun 14, 2014Updated 11 years ago