Forescout / project-memoria-detectorView external linksLinks
☆323Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for project-memoria-detector
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
Sorting:
- A DFIR tool written in Python.☆1,053Jun 9, 2021Updated 4 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Easily build, consume and share apps to integrate with the Forescout platform. Terms of use apply please see attached link.☆55Jan 30, 2026Updated 2 weeks ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Aug 7, 2021Updated 4 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Set of tools to analyze Tinynuke samples☆15Nov 18, 2021Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Dec 2, 2025Updated 2 months ago
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Malware, spam, and phishing indicators of compromise that involve the use of COVID-19 or coronavirus in some way☆33Jul 4, 2020Updated 5 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- A Python implementation of the Community ID flow hashing standard☆24Nov 29, 2023Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- PoC exploits I wrote. They're as is and I will not offer support☆278Apr 30, 2024Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- ☆1,283Apr 29, 2025Updated 9 months ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,663Jan 23, 2025Updated last year
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆30Jan 13, 2026Updated last month
- Linux Auditing System logs pretty printer☆11Dec 22, 2019Updated 6 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- VCAL viewer for MUTT☆16Oct 24, 2025Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- Waveform Generator☆11Jul 18, 2022Updated 3 years ago
- Recordization library☆11Jan 26, 2026Updated 2 weeks ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Durango (Xbox One) RF Unit I2C tooling☆16Sep 23, 2025Updated 4 months ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago