Category: IoT

apparatus

apparatus: A graphical security analysis tool for IoT networks

ASTo – Apparatus Software Tool An IoT network security analysis tool and visualizer ASTo is security analysis tool for IoT networks. It is developed to support the Apparatus security framework. ASTo is based on electron and cytoscape.js....

firmwalker

firmwalker: searching the extracted firmware file system

firmwalker A simple bash script for searching the extracted or mounted firmware file system. It will search through the extracted or mounted firmware file system for things of interest such as: etc/shadow and etc/passwd...

IVideon data breach cameradar

Cameradar v2.0.0: Hacking RTSP CCTV Cameras

Cameradar Cameradar allows you to Detect open RTSP hosts on any accessible target host Detect which device model is streaming Launch automated dictionary attacks to get their stream route (e.g.: /live.sdp) Launch automated dictionary attacks to...

AntiEye

AntiEye: IP webcam penetration test suit

Sum AntiEye is an experimental utility pack, designed to ease the process of remote webcam access testing. Powered simultaneously by HTML5 and .NET, it was designed with Windows support in mind. Parser Design: browser-based converter, implemented...

dependency-track

dependency-track v3.1.1 releases: intelligent Software Composition Analysis (SCA) platform

Dependency-Track Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components, however, comes at a cost....

IoT Exploitation Framework

Expliot: Internet Of Things Exploitation Framework

Internet Of Things Exploitation Framework Expliot is a framework for security testing IoT and IoT infrastructure. It provides a set of plugins (test cases) and can be extended easily to create new plugins. Install...

routersploit

routersploit v3.3.0 released: Router Exploitation Framework

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aid penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules...

Printer Exploitation Toolkit

PRET: Printer Exploitation Toolkit

PRET is a new tool for printer security testing developed in the scope of a Master’s Thesis at Ruhr University Bochum. It connects to a device via network or USB and exploits the features...

Car Backdoor Maker

Car Backdoor Maker

The Car Backdoor Maker is a software for making attack templates and loads them into The Bicho. Before starting, please read how to Get The Bicho hardware. Install and Usage This project has its wiki where you will...