iotsrg / IoT-Pentest-devices-and-purposeView external linksLinks
☆72Aug 19, 2025Updated 5 months ago
Alternatives and similar repositories for IoT-Pentest-devices-and-purpose
Users that are interested in IoT-Pentest-devices-and-purpose are comparing it to the libraries listed below
Sorting:
- List of the tools and usage☆234Jul 4, 2025Updated 7 months ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- The Dumb Network Fuzzer☆20Jul 18, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A ping detection tool for linux☆24Apr 20, 2020Updated 5 years ago
- A Virtual environment for Pentesting IoT Devices☆441Aug 25, 2025Updated 5 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 weeks ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- Implementation of Wappalyzer in Python☆55Dec 8, 2022Updated 3 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- ☆10Jun 14, 2016Updated 9 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- ☆16Aug 11, 2020Updated 5 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated 10 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Nov 29, 2020Updated 5 years ago
- Lightweight In-App Web Application Firewall for PHP☆42Aug 26, 2020Updated 5 years ago
- Simple command shell collections☆35Mar 7, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆65Apr 13, 2021Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Tools and scripts written for personal use☆12Jan 3, 2021Updated 5 years ago