Forescout / project-memoria-detector
☆318Updated 3 years ago
Alternatives and similar repositories for project-memoria-detector:
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
- SunBurst DGA Decode Script☆207Updated 4 years ago
- ☆560Updated last year
- Ongoing Infosec Deals☆111Updated 4 months ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆891Updated 10 months ago
- A DFIR tool written in Python.☆1,046Updated 3 years ago
- ☆194Updated 4 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆833Updated 3 months ago
- FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband fir…☆794Updated 5 months ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆352Updated last year
- ☆100Updated 4 years ago
- Guidance for mitigation web shells. #nsacyber☆971Updated last year
- List of the tools and usage☆232Updated 2 years ago
- 100Gbps Intrusion Detection and Prevention System☆680Updated 7 months ago
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆906Updated 2 weeks ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- ☆290Updated 3 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 2 years ago
- PoC exploits for software vulnerabilities☆678Updated 3 years ago
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358Updated 10 months ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 3 years ago
- ☆1,263Updated last month
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆209Updated 4 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,257Updated last year
- Understand adversary tradecraft and improve detection strategies☆707Updated 2 years ago
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,862Updated 4 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,172Updated last month