herrfeder / Offensive_IOT_ExploitationLinks
-notes and scripts for online course OffIOT
☆12Updated 8 years ago
Alternatives and similar repositories for Offensive_IOT_Exploitation
Users that are interested in Offensive_IOT_Exploitation are comparing it to the libraries listed below
Sorting:
- Format string exploit generation☆10Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- ☆23Updated 4 years ago
- CTF Writeups☆18Updated 8 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 8 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆16Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- ZigBee hacking tools and scripts☆13Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Optional plugins for MITMf☆16Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 8 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago