m4n3dw0lf / SecureFiwareLinks
Proposing security measures and security analysis in the Fiware IoT environment.
☆22Updated 7 years ago
Alternatives and similar repositories for SecureFiware
Users that are interested in SecureFiware are comparing it to the libraries listed below
Sorting:
- A tool to help you manage your leaks☆34Updated 8 years ago
- ☆20Updated 9 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- ☆63Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- Listing subdomains about a main domain☆58Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Generate pentest reports based on github issues.☆16Updated 3 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Some scripts and exploits☆148Updated 7 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago