robertdavidgraham / iotpasswdsLinks
Recording default/backdoor passwords from IoT devices I come across
☆38Updated 9 years ago
Alternatives and similar repositories for iotpasswds
Users that are interested in iotpasswds are comparing it to the libraries listed below
Sorting:
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Scapy tools and scripts☆20Updated 5 years ago
- Password cracking utility☆54Updated 4 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40Updated 11 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- ☆16Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago