Hestat / minerchkLinks
Bash script to Check for malicious Cryptomining
☆38Updated 7 years ago
Alternatives and similar repositories for minerchk
Users that are interested in minerchk are comparing it to the libraries listed below
Sorting:
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- VirtualBox Disk Image Encryption password cracker☆32Updated 10 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- ☆11Updated 8 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- ☆73Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 10 months ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- ☆22Updated 9 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- ☆26Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago