warberry: WarBerryPi – Tactical Exploitation
WarBerryPi WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of...
WarBerryPi WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of...
SecureFiware Overview End-to-end encryption COAP Device to LWM2M IoT Agent encrypted communication For the encrypted communication between the device and the IoT agent, we’ve embedded a DTLS server feature in...
The Car Backdoor Maker is a software for making attack templates and loads them into The Bicho. Before starting, please read how to Get The Bicho hardware. Install and Usage This project...
gattacker Bluetooth Low Energy incorporates device pairing and link-layer encryption. However, a significant amount of devices do not implement these features. They either do not provide transmission security at all or ensure...
NETSCRAPED EXPLOIT TOOL Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for research only. Download Requirement Python...
IoT / Machine Learning / Network PenTest
by do son · Published April 7, 2018 · Last modified May 9, 2020
Deep Exploit Fully automatic penetration test tool using Machine Learning. Deep Exploit is fully automated penetration tool linked with Metasploit. Deep Exploit has two exploitation modes. Intelligence mode Deep Exploit identifies the...
crackle cracks BLE Encryption (AKA Bluetooth Smart) It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary...
IDAPython Embedded Toolkit The IDAPython Embedded Toolkit is a set of script to automate many of the steps associated with statically analyzing, or reverse engineering, the firmware of embedded devices...
Firmware Analysis Toolkit FAT is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware. This is built in order to...
RFCrack is my personal RF test bench, it was developed for testing RF communications between any physical device that communicates over sub Ghz frequencies. IoT devices, Cars, Alarm Systems etc…...
M3UAScan A Scanner for M3UA protocol to detect Sigtran supporting nodes M3UA stands for MTP Level 3 (MTP3) User Adaptation Layer as defined by the IETF SIGTRAN working group in...
GSM Assessment Toolkit – GAT GAT is an evaluation framework for assessing security-related aspects of mobile networks based on the GSM standard. The framework mainly relies on gr-gsm for the processing of...
ss7MAPer SS7 MAP (pen-)testing toolkit Binary releases As a lot of people run into problems building the tool, there are binary releases which can be found here: https://github.com/ernw/ss7MAPer/tree/master/releases As people also...
CANToolz aka YACHT (Yet Another Car Hacking Tool) CANToolz is a framework for analysing CAN networks and devices. This tool based on different modules which can be assembled in pipe...
safeseven : SS7 Assessment Tool Requirements Linux OS with sctp support JRE 1.7 or above simulating ss7 network simulating HLR simulating msc/vlr running STP Running safeseven SMS related operations USSD...