m4n3dw0lf / SecureFiwareLinks
Proposing security measures and security analysis in the Fiware IoT environment.
☆22Updated 7 years ago
Alternatives and similar repositories for SecureFiware
Users that are interested in SecureFiware are comparing it to the libraries listed below
Sorting:
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 8 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- ☆21Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Some scripts and exploits☆147Updated 7 years ago
- ☆63Updated 7 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- ☆39Updated 11 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- ☆20Updated 9 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 9 years ago
- ☆99Updated 7 years ago