Labeled Dataset of IoT Traffic
As presented in Through the Spyglass: Towards labeling on-demand IoT traffic
-
Please cite: Daniel Campos and TJ OConnor. Towards labeling on-demand iot traffic. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]
MITMProxy Scripts for Vulnerable IoT Companion Apps
As presented in Through the Spyglass: Toward IoT Companion App
-
Please cite: TJ OConnor, Dylan Jesse, and Daniel Camps. Through the spyglass: Toward iot companion app man-in-the-middle attacks. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]
Metasploit Modules for HoneyBadger Framework
As presented at ShmooCon 2013: Hide and Seek, Post-Exploitation Style
-
HoneyBadger Framework, written by Tim Thomes
Violent Python
Source code from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers