kh4sh3i / MQTT-PentestingLinks
MQTT exploit and Pentesting guide for penetration tester
☆17Updated last year
Alternatives and similar repositories for MQTT-Pentesting
Users that are interested in MQTT-Pentesting are comparing it to the libraries listed below
Sorting:
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- External Playbooks for Public Access☆39Updated 8 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆21Updated last year
- Bluetooth Security Assessment Methodology☆136Updated last year
- ☆128Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 8 months ago
- Mitrastar MIPS router analysis and exploitation☆18Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 8 months ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- ☆21Updated last month
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated 10 months ago
- ☆116Updated 2 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆20Updated 5 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆44Updated last year
- ☆25Updated last year
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆44Updated last month
- Upload files done during my research.☆165Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- Real Android malware apps discussed in the book☆40Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆12Updated last year