sahilmgandhi / IotSharkView external linksLinks
IotShark - Monitoring and Analyzing IoT Traffic
☆92Nov 12, 2022Updated 3 years ago
Alternatives and similar repositories for IotShark
Users that are interested in IotShark are comparing it to the libraries listed below
Sorting:
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- Simple way to disable/rename buttons from a task manager☆30Feb 17, 2020Updated 6 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8.☆126Nov 2, 2021Updated 4 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Mar 12, 2020Updated 5 years ago
- Logging clients with airodump-ng☆15Dec 13, 2013Updated 12 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- ☆25May 9, 2021Updated 4 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆143Dec 9, 2025Updated 2 months ago
- ☆26Apr 5, 2020Updated 5 years ago
- Building an Automated Perimeter Scanning System with Open Source Tools - NMAP, IVRE and Netbox☆13May 5, 2023Updated 2 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email☆11Jun 23, 2020Updated 5 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆73May 27, 2021Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 2 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 6 months ago
- This kernel patch enable all 2GHZ & 5GHZ channels (without restriction) for ath9k & ath5k forced to use buildin world regulatory. Work wi…☆13Feb 8, 2024Updated 2 years ago
- This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, …☆53Mar 29, 2023Updated 2 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45May 6, 2019Updated 6 years ago
- Easy to use APK/IPA Mobile App Inspector☆79Jun 30, 2022Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago