Exploitation Framework for Embedded Devices
-
Updated
May 23, 2024 - Python
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Exploitation Framework for Embedded Devices
Web path scanner
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
🔥 Web-application firewalls (WAFs) from security standpoint.
Open Source Vulnerability Management Platform
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
被动式漏洞扫描系统
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Your Everyday Threat Intelligence
📡 A python program to create a fake AP and sniff data.
WebMap-Nmap Web Dashboard and Reporting
A default credential scanner.
The Network Execution Tool
Infosec Wordlists and more.
Created by The cybersecurity community