ANG13T / aerospace-cve-listLinks
A comprehensive list of aerospace affiliated CVEs ππΎβ οΈ
β27Updated last year
Alternatives and similar repositories for aerospace-cve-list
Users that are interested in aerospace-cve-list are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessmentsβ104Updated 11 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alertsβ125Updated 2 weeks ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Updated last year
- A Slack bot phishing framework for Red Teaming exercisesβ165Updated last year
- A small executable to trick a user to authenticate using code matching MFAβ69Updated 2 years ago
- The most average C2 ever (MACE)β97Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β106Updated 2 years ago
- Fast Path Traversal exploitation toolβ21Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!β33Updated last month
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β45Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networβ¦β64Updated last month
- Tool for analyzing SAP Secure Network Communications (SNC).β56Updated last year
- A user enumeration tool for Slack.β34Updated last year
- β76Updated last year
- β35Updated 2 years ago
- A little cheatsheet for NetExecβ32Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environmentsβ89Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.β87Updated 10 months ago
- quick and dirty proof-of-concept to hide shells in imagesβ51Updated last year
- Repo for all my exploits/PoCsβ53Updated 8 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX formatβ36Updated last month
- Modular framework for automating triaging, malware analysis, and analyst workflowsβ44Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europeβ37Updated last year
- Recon scripts for Red Team and Web blackbox auditingβ25Updated last week
- This is an AD pentest tools collectionβ59Updated last year
- linikatz is a tool to attack AD on UNIXβ153Updated 2 years ago
- Tool for enumerating Active Directory environmentsβ49Updated 2 years ago
- A Havoc UI tool to pivot onto a machine using ligolo-ngβ50Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certificationβ43Updated 2 years ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IPβ84Updated 7 months ago