Category: IoT

JackIt – Exploit Code for Mousejack

JackIt Do you like JackIt but don’t want to carry around a laptop? Check this out. What This is a partial implementation of Bastille’s MouseJack exploit. See mousejack.com for more details. Full credit goes to Bastille’s team for discovering this...

ESP32 Wi-Fi Penetration Tool

ESP32 Wi-Fi Penetration Tool

ESP32 Wi-Fi Penetration Tool This project introduces an universal tool for the ESP32 platform for implementing various Wi-Fi attacks. It provides some common functionality that is commonly used in Wi-Fi attacks and makes implementing...

vehicle network analysis

CANalyse: vehicle network analysis and attack tool

CANalyse CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect to simple user interfaces such as Telegram. Basically, while using this tool the...

mud-visualizer

mud-visualizer: visualize MUD files

Manufacturer Usage Description (MUD) Visualizer This tool can be used to visualize the MUD files in JSON format. Motivation MUD files are plain text files in JSON format that contain ACL rules for a...

TCP/IP stack vulnerability

project-memoria-detector: detect TCP/IP stack vulnerabilities

project-memoria-detector The project-memoria-detector tool aims to determine whether a target network device runs a vulnerable TCP/IP stack. Currently, the tool supports fingerprints for four embedded TCP/IP stacks (and their variations) that were found vulnerable during...