FabioBaroni / CVE-2024-3094-checkerLinks
Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)
☆71Updated last year
Alternatives and similar repositories for CVE-2024-3094-checker
Users that are interested in CVE-2024-3094-checker are comparing it to the libraries listed below
Sorting:
- Check IP addresses against known cloud provider IP address ranges☆46Updated 2 years ago
 - ☆55Updated 9 months ago
 - ☆78Updated last year
 - Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
 - This is an AD pentest tools collection☆59Updated last year
 - Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 2 weeks ago
 - Automated Active Directory lab running on Proxmox☆86Updated 2 months ago
 - Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated last year
 - CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
 - Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
 - MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated 11 months ago
 - DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
 - Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆22Updated 9 months ago
 - A fast and comprehensive tool for organizational network scanning☆135Updated last year
 - A simple scanner for identifying vulnerable cups-browsed instances on your network☆64Updated last year
 - Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
 - ICMPWatch: ICMP Packet Sniffer☆58Updated last year
 - Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆38Updated 2 years ago
 - A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
 - 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆45Updated this week
 - SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
 - With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
 - Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 9 months ago
 - 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 6 months ago
 - ☆195Updated 2 years ago
 - Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 10 months ago
 - Tool for enumerating Active Directory environments☆49Updated 2 years ago
 - RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 6 months ago
 - Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
 - This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆99Updated 2 months ago