lcashdol / IoTLinks
☆50Updated 4 years ago
Alternatives and similar repositories for IoT
Users that are interested in IoT are comparing it to the libraries listed below
Sorting:
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- ☆57Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30Updated 10 years ago
- Bypass captive portals by impersonating inactive users☆78Updated 10 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆98Updated last year
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 8 months ago
- ☆54Updated 4 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆69Updated 9 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆142Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 5 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 5 months ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- Docker images for learning wifi hacking☆69Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆106Updated 4 years ago
- hack400tool☆107Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆21Updated 8 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆126Updated 2 years ago