MalwareTech / CVE-2024-47176-ScannerLinks
A simple scanner for identifying vulnerable cups-browsed instances on your network
☆61Updated 9 months ago
Alternatives and similar repositories for CVE-2024-47176-Scanner
Users that are interested in CVE-2024-47176-Scanner are comparing it to the libraries listed below
Sorting:
- CLI & library to search for default credentials among thousands of Products / Vendors☆52Updated 5 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- hiding in plain sight: part 2☆45Updated last year
- ☆109Updated 8 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆90Updated 11 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆49Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated 3 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆125Updated last year
- Script to perform some hashcracking logic automagically☆72Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 8 months ago
- ☆190Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- ☆54Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated 2 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 4 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 5 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- tool for identifying guest relationships between companies☆99Updated last year
- NTP Exfiltration Tool☆142Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆236Updated last month