BSI-Bund / pySCASsoLinks
☆12Updated 5 months ago
Alternatives and similar repositories for pySCASso
Users that are interested in pySCASso are comparing it to the libraries listed below
Sorting:
- ☆37Updated last week
- ☆106Updated 11 months ago
- VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypte…☆90Updated 5 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆65Updated last month
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 5 months ago
- ☆59Updated 6 years ago
- ☆116Updated 2 years ago
- ☆106Updated last week
- Bluetooth Security Assessment Methodology☆140Updated last year
- OSDP attack tool (and the Elvish word for friend)☆108Updated 2 years ago
- PoC for CVE-2023-20126☆23Updated 2 years ago
- Postfix SMTP Smuggling - Expect Script POC☆23Updated 2 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆75Updated 4 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- ☆24Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 11 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 3 weeks ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆65Updated last year
- eBPF hacks☆190Updated last year
- ☆23Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last month
- Repository for application-layer loop DoS