ANG13T / aerospace-cve-listLinks
A comprehensive list of aerospace affiliated CVEs ππΎβ οΈ
β26Updated 9 months ago
Alternatives and similar repositories for aerospace-cve-list
Users that are interested in aerospace-cve-list are comparing it to the libraries listed below
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!β33Updated 2 weeks ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β121Updated last year
- Collection of Tools & Techniques for analyzing URLsβ32Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFAβ69Updated 2 years ago
- β78Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environmentsβ90Updated last year
- β35Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).β52Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Updated last year
- quick and dirty proof-of-concept to hide shells in imagesβ50Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify β¦β78Updated 11 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX formatβ34Updated 7 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy serviceβ74Updated last year
- A user enumeration tool for Slack.β31Updated last year
- A collection of tools that I use in CTF's or for assessmentsβ102Updated 8 months ago
- Fast Path Traversal exploitation toolβ21Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrapβ¦β52Updated this week
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoCβ62Updated 10 months ago
- AI modular structure that provides automation-based attack and penetrationβ14Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commaβ¦β34Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β36Updated 2 years ago
- The most average C2 ever (MACE)β96Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β105Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both β¦β40Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcpβ71Updated this week
- Top 400 passwords as per HaveIBeenPwnedβ22Updated 11 months ago
- A python3 script searching for secret on swaggerhubβ66Updated 3 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegatβ¦β34Updated 2 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)β29Updated 10 months ago