srozb / iot-honey
☆11Updated 8 years ago
Alternatives and similar repositories for iot-honey:
Users that are interested in iot-honey are comparing it to the libraries listed below
- reveal xored strings in mirai binary☆12Updated 6 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- ☆15Updated 9 years ago
- Converts burp's sitemap to sulley's fuzzing script☆12Updated 9 years ago
- Some Of Huawei Routers Exploits☆13Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- "HeaderScan" Burp Plugin☆16Updated 10 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 11 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆11Updated 7 years ago
- ☆16Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- ☆11Updated 6 years ago
- Juniper backdoor☆13Updated 9 years ago
- ☆12Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 6 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Updated 8 years ago
- ☆17Updated 6 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago