☆26Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for IoT-Lab-Setup-Guide
Users that are interested in IoT-Lab-Setup-Guide are comparing it to the libraries listed below
Sorting:
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆33Mar 4, 2025Updated last year
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 3 months ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- Differential Fuzzer to hunt for logic bugs on Perl Modules☆26Updated this week
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Simple and pratical security gate for Github Security Alerts☆19Updated this week
- ☆29Apr 7, 2023Updated 2 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated 3 weeks ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- ☆17Apr 9, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Bruteforces Fortinet SSL VPNs☆58Sep 19, 2023Updated 2 years ago
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆13Jun 15, 2025Updated 9 months ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆15Mar 11, 2024Updated 2 years ago
- SUCTF iCloudMusic 源码及writeup☆10Oct 12, 2022Updated 3 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Jan 18, 2022Updated 4 years ago
- go-utils☆12Nov 22, 2025Updated 3 months ago
- Recover the Android swipe lock pattern from a gesture.key file.☆23Jun 16, 2016Updated 9 years ago