Exploitation Framework for Embedded Devices
-
Updated
May 23, 2024 - Python
Exploitation Framework for Embedded Devices
Web path scanner
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
🔥 Web-application firewalls (WAFs) from security standpoint.
Open Source Vulnerability Management Platform
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
被动式漏洞扫描系统
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Your Everyday Threat Intelligence
📡 A python program to create a fake AP and sniff data.
WebMap-Nmap Web Dashboard and Reporting
A default credential scanner.
Infosec Wordlists and more.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Add a description, image, and links to the infosec topic page so that developers can more easily learn about it.
To associate your repository with the infosec topic, visit your repo's landing page and select "manage topics."