Explore 9 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Ericsson Enterprise Wireless Solutions provides secure wireless connectivity for businesses through private 5G networks, enterprise coverage solutions, and cloud-managed WWAN infrastructure with integrated zero trust security.
Ericsson Enterprise Wireless Solutions provides secure wireless connectivity for businesses through private 5G networks, enterprise coverage solutions, and cloud-managed WWAN infrastructure with integrated zero trust security.
A conference featuring talks and workshops on various Python-related topics.
A conference featuring talks and workshops on various Python-related topics.
A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.