CiscoCXSecurity / tlsplaybackLinks
tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-RTT
☆14Updated 6 years ago
Alternatives and similar repositories for tlsplayback
Users that are interested in tlsplayback are comparing it to the libraries listed below
Sorting:
- Exfiltration based on custom X509 certificates☆26Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- ☆22Updated 4 years ago
- Site for IWS book content☆18Updated 6 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- ☆10Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆12Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆16Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago