MalwareTech / CVE-2024-47176-Scanner
A simple scanner for identifying vulnerable cups-browsed instances on your network
☆57Updated last month
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-47176-Scanner
- Generate a report with charts and statistics about cracked passwords in XLSX format☆31Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆39Updated 4 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆109Updated 9 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆58Updated 4 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆35Updated 9 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 8 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆12Updated 2 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆45Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆34Updated last year
- All kinds of tiny shells☆59Updated last year
- ☆34Updated 8 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated last month
- hiding in plain sight: part 2☆46Updated 4 months ago
- ☆30Updated 3 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 7 months ago
- Modular framework to exploit UPS devices☆61Updated last year
- ☆28Updated last year
- Gadget IoC removal from HAK5's BashBunny☆17Updated last year
- Provides an overview of the inner file structure of a PDF☆24Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 weeks ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆84Updated 9 months ago
- ☆15Updated 2 months ago
- tool for identifying guest relationships between companies☆84Updated 4 months ago
- ☆77Updated 7 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆69Updated 3 weeks ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated last month