A tool to assist with network-based hunting for GRU's Drovorub malware c2
☆25Aug 28, 2020Updated 5 years ago
Alternatives and similar repositories for drovorub-hunt
Users that are interested in drovorub-hunt are comparing it to the libraries listed below
Sorting:
- ☆11Mar 19, 2019Updated 6 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 5 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Jan 5, 2023Updated 3 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Aug 27, 2020Updated 5 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Yet another open S3 bucket finder☆20Mar 8, 2018Updated 8 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 3 weeks ago
- badbucket checks your s3 bucket for common misconfigurations☆24Jun 25, 2017Updated 8 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Feb 22, 2020Updated 6 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- code written on artificial intelligence lab at school☆10Oct 4, 2021Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- (Unofficial) Python API for https://crt.sh☆148Feb 25, 2021Updated 5 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- Hacks For Subdomain Enumeration☆34Jun 7, 2022Updated 3 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 6 years ago