☆26Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for IoT-Lab-Setup-Guide
Users that are interested in IoT-Lab-Setup-Guide are comparing it to the libraries listed below
Sorting:
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 2 months ago
- ☆13Dec 29, 2022Updated 3 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated last year
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Jul 4, 2024Updated last year
- ☆21Sep 25, 2023Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Mar 13, 2025Updated 11 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Open-Source Phishing Toolkit☆19May 23, 2021Updated 4 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆46Mar 4, 2024Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Jun 5, 2025Updated 8 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 4 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 2 weeks ago
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- ☆29Apr 7, 2023Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Bruteforces Fortinet SSL VPNs☆57Sep 19, 2023Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- ☆65Mar 15, 2024Updated last year
- The next generation encrypted file sharing project☆94Updated this week