kh4sh3i / MQTT-PentestingLinks
MQTT exploit and Pentesting guide for penetration tester
☆16Updated last year
Alternatives and similar repositories for MQTT-Pentesting
Users that are interested in MQTT-Pentesting are comparing it to the libraries listed below
Sorting:
- ☆125Updated last year
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 weeks ago
- A collection of my public security advisories.☆27Updated 4 months ago
- External Playbooks for Public Access☆39Updated 7 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆44Updated last year
- Bluetooth Security Assessment Methodology☆133Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 9 months ago
- Slides and videos from my public speeches / conferences☆76Updated 3 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 6 months ago
- ☆22Updated 10 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆11Updated 10 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- ☆25Updated last year
- Upload files done during my research.☆164Updated 4 months ago
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆40Updated last month
- ☆69Updated last week
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Mitrastar MIPS router analysis and exploitation☆17Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- ☆24Updated 2 years ago