CiscoCXSecurity / tlsplaybackLinks
tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-RTT
☆16Updated 7 years ago
Alternatives and similar repositories for tlsplayback
Users that are interested in tlsplayback are comparing it to the libraries listed below
Sorting:
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- ☆30Updated 7 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- ☆69Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- ☆13Updated 6 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆12Updated 6 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 7 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Updated 7 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆39Updated 5 months ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Let's obscure some IPv4 addresses☆37Updated 3 years ago
- Rapid Assessment of Web Resources☆18Updated 9 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 6 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- Threat Box Assessment Tool☆19Updated 4 years ago
- ☆39Updated 4 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆26Updated 4 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 3 years ago
- ☆15Updated 6 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆96Updated 4 years ago
- ☆53Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆76Updated 7 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 6 years ago