reaperb0t / awesome-iot-ics-embed-pentest
☆17Updated 7 years ago
Alternatives and similar repositories for awesome-iot-ics-embed-pentest:
Users that are interested in awesome-iot-ics-embed-pentest are comparing it to the libraries listed below
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 10 months ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- A simple web application vulnerability lab made for the HackerOne Veterans day event☆18Updated 4 years ago
- ☆47Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 7 months ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- Modbus VCR☆27Updated 7 years ago
- Privilege escalation using dmidecode☆20Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- public exploits☆35Updated last year
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- ☆23Updated 4 years ago
- ☆15Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago