Exploitation Framework for Embedded Devices
-
Updated
Jul 19, 2021 - Python
{{ message }}
Exploitation Framework for Embedded Devices
Web path scanner
SpiderFoot automates OSINT so you can focus on analysis.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A collection of open source and commercial tools that aid in red team operations.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
A curated list of awesome infosec courses and training resources.
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Collaborative Penetration Test and Vulnerability Management Platform
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Is there a way to skip the nmap scan and go straight to the attacking routes? In case i already know the target list is full of open rtsp port IPs.
Is subdomains hosted at discourse is vulnerable to takeover or not?
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
Awesome Node.js Security resources
A proposed standard that allows websites to define security policies.
This challenge is Inon Shkedy's 31 days API Security Tips.
VirusTotal Wanna Be - Now with 100% more Hipster
Add a description, image, and links to the infosec topic page so that developers can more easily learn about it.
To associate your repository with the infosec topic, visit your repo's landing page and select "manage topics."
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?