Category: IoT

routersploit

routersploit v3.4.3 released: Router Exploitation Framework

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aid penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules...

CarHacking

CarHackingTools: Install and Configure Common Car Hacking Tools

CarHacking.Tools CarHacking.Tools is a scripts collection of scripts to help jump-start car research (and hacking?). All the scripts are designed to run on Ubuntu 18.04. Included Tools The following tools are installed and configured automatically: Tool...

gattacker

gattacker: Bluetooth Low Energy security assessment

gattacker Bluetooth Low Energy incorporates device pairing and link-layer encryption. However, a significant amount of devices do not implement these features. They either do not provide transmission security at all or ensure it by own means...

ss7MAPer: SS7 MAP (pen-)testing toolkit

ss7MAPer SS7 MAP (pen-)testing toolkit Binary releases As a lot of people run into problems building the tool, there are binary releases which can be found here: https://github.com/ernw/ss7MAPer/tree/master/releases As people also run into problems using...

JackIt – Exploit Code for Mousejack

JackIt Do you like JackIt but don’t want to carry around a laptop? Check this out. What This is a partial implementation of Bastille’s MouseJack exploit. See mousejack.com for more details. Full credit goes to Bastille’s team for discovering this...

IoT security toolkit

Genzai: The IoT security toolkit

Genzai Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as input and scan them for default password issues and potential vulnerabilities based on...

dronesploit

dronesploit v1.1.15 releases: Drone pentesting framework console

DroneSploit This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For ease of use, the interface has a layout that looks like Metasploit. Install...

webcam vulnerability scanning

Ingram: webcam device vulnerability scanning tool

Ingram This is a webcam device vulnerability scanning tool, that already supports Hikvision, Dahua, and other devices. Installation Firstly, clone this repo: git clone https://github.com/jorhelp/Ingram.git Then, go to the repo dir, create a virtual...

dependency-track

dependency-track v4.9 releases: intelligent Software Composition Analysis platform

Dependency-Track Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components, however, comes at a cost....