Repo with some info about malware in IoT
☆15May 31, 2018Updated 7 years ago
Alternatives and similar repositories for IoT-Malware-Info
Users that are interested in IoT-Malware-Info are comparing it to the libraries listed below
Sorting:
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆314Jan 13, 2021Updated 5 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Responsive Hugo theme inspired in YouTube layout☆11Apr 25, 2023Updated 2 years ago
- Mirai☆42Oct 19, 2021Updated 4 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Worst Android kernel fuzzer☆45Aug 12, 2020Updated 5 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- IDA PRO signature files that can be used in reversing the iPhone baseband. On an iPhone 4 firmware can pickup upto 800 functions when al…☆27May 15, 2012Updated 13 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- "When one door of happiness closes, another opens; but often we look so long at the closed door that we do not see the one which has been…☆17Aug 17, 2021Updated 4 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago
- App to update Cisco Unity Call Handler's using Google's Cloud Text to Speech☆12Mar 15, 2023Updated 3 years ago
- legacy MTK devices preLoader from Mediatek☆20Apr 29, 2024Updated last year
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- React component for customizable chatbot UI with Dialogflow integration☆23Nov 27, 2017Updated 8 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- ☆15Jan 24, 2021Updated 5 years ago
- Firmware Reversing Repo :p☆17Oct 11, 2015Updated 10 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- Arp Poisoning tool in C using raw sockets☆20Mar 8, 2025Updated last year
- strace in docker☆13Mar 3, 2017Updated 9 years ago
- Decentralized file sharing over LAN☆25Feb 13, 2019Updated 7 years ago
- CNVD-2023-27598☆18Apr 20, 2023Updated 2 years ago
- ☆17Apr 8, 2015Updated 10 years ago
- Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters☆13Aug 15, 2022Updated 3 years ago
- This is a repository for collecting and collating vulnerability disclosures, tips, and tools☆17Nov 19, 2025Updated 4 months ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- ☆41Jul 20, 2020Updated 5 years ago
- ☆11Apr 28, 2018Updated 7 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago