yakuza8 / peniotLinks
PENIOT: Penetration Testing Tool for IoT
☆224Updated 3 years ago
Alternatives and similar repositories for peniot
Users that are interested in peniot are comparing it to the libraries listed below
Sorting:
- A Virtual environment for Pentesting IoT Devices☆433Updated last month
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- Search an exploit in the local exploitdb database by its CVE☆174Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆237Updated 3 months ago
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- Devkit for building Metasploit-like consoles☆250Updated last month
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- IoT Security Checker is a framework for automating some IoT-related security checks☆33Updated 6 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆332Updated 5 years ago
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- ☆69Updated 10 months ago
- Some collected notes about nmap☆119Updated last year
- A list of lists involving IoT in general☆147Updated 3 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆171Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆326Updated last year
- ☆112Updated 5 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆167Updated 5 years ago
- Low Interaction Mobile Honeypot☆94Updated last month
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆910Updated 2 years ago
- ☆53Updated 5 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆76Updated 3 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- IoT and Operational Technology Honeypot☆103Updated last year
- ☆98Updated 3 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆404Updated last year
- MODBUS Penetration Testing Framework☆83Updated 9 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- ☆17Updated 7 years ago