kh4sh3i / MQTT-PentestingLinks
MQTT exploit and Pentesting guide for penetration tester
☆15Updated last year
Alternatives and similar repositories for MQTT-Pentesting
Users that are interested in MQTT-Pentesting are comparing it to the libraries listed below
Sorting:
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- External Playbooks for Public Access☆39Updated 5 months ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 7 months ago
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Updated 3 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 5 months ago
- Security feed, done in the stupid simple way☆25Updated 6 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- ☆45Updated 5 months ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆42Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- ☆25Updated last year
- ☆123Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated last month
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- ☆27Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆69Updated 9 months ago