FabioBaroni / CVE-2024-3094-checker
Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)
☆73Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-3094-checker
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆126Updated 6 months ago
- MS Graph Commands and Tools for Blue Teamers☆48Updated last year
- ICMPWatch: ICMP Packet Sniffer☆54Updated last month
- Citrix Scanner for CVE-2023-3519☆48Updated last year
- ☆77Updated 7 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆22Updated 2 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 3 months ago
- CVE-2023-7028☆58Updated 10 months ago
- This is an AD pentest tools collection☆53Updated 4 months ago
- ☆31Updated 7 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆71Updated 3 weeks ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆89Updated last year
- ☆44Updated last month
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆176Updated 3 months ago
- Automated Active Directory lab running on Proxmox☆71Updated last month
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 6 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 5 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆57Updated last month
- ☆103Updated 9 months ago
- Azure AD enumeration over MS Graph☆80Updated last year
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆81Updated last year
- Assess the security of your Active Directory with few or all privileges.☆181Updated last week
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆43Updated 5 months ago
- Detection rule validation☆41Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year
- A port scanner written purely in PowerShell.☆76Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆309Updated 7 months ago