robertdavidgraham / iotpasswdsLinks
Recording default/backdoor passwords from IoT devices I come across
☆38Updated 9 years ago
Alternatives and similar repositories for iotpasswds
Users that are interested in iotpasswds are comparing it to the libraries listed below
Sorting:
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Password cracking utility☆54Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 15 years ago
- ☆16Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Phishing Toolkit☆19Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago