kh4sh3i / MQTT-PentestingLinks
MQTT exploit and Pentesting guide for penetration tester
☆23Updated 2 years ago
Alternatives and similar repositories for MQTT-Pentesting
Users that are interested in MQTT-Pentesting are comparing it to the libraries listed below
Sorting:
- Bluetooth Security Assessment Methodology☆147Updated 3 weeks ago
- ☆131Updated 2 years ago
- External Playbooks for Public Access☆41Updated 11 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆84Updated 5 months ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated last week
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Mitrastar MIPS router analysis and exploitation☆19Updated 4 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆19Updated last year
- ios tingz☆63Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 3 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆22Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated 11 months ago
- ☆116Updated 2 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆53Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 6 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Updated 7 months ago
- Official writeups for Hack The Boo CTF 2023☆45Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A collection of my public security advisories.☆28Updated 2 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 11 months ago