FabioBaroni / CVE-2024-3094-checkerLinks
Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)
☆71Updated last year
Alternatives and similar repositories for CVE-2024-3094-checker
Users that are interested in CVE-2024-3094-checker are comparing it to the libraries listed below
Sorting:
- ☆78Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Check IP addresses against known cloud provider IP address ranges☆45Updated 2 years ago
- This is an AD pentest tools collection☆58Updated last year
- ICMPWatch: ICMP Packet Sniffer☆58Updated 10 months ago
- Automated Active Directory lab running on Proxmox☆83Updated 3 weeks ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆38Updated last year
- ☆54Updated 7 months ago
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated 2 weeks ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 10 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 7 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆22Updated 7 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 6 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆41Updated last month
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 2 months ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- ☆67Updated 7 months ago
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated 11 months ago
- ☆191Updated 2 years ago
- ☆109Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 10 months ago