MalwareTech / SpookySSLTools
Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)
☆41Updated 2 years ago
Alternatives and similar repositories for SpookySSLTools:
Users that are interested in SpookySSLTools are comparing it to the libraries listed below
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- ☆18Updated 4 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 9 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Hackers Don't Give A Shit☆15Updated 5 years ago
- A VS Code extension to preview XML nmap output☆44Updated last year
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last month
- Source code and examples for Antignis☆36Updated 2 years ago
- ☆15Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- DEbian Cve REproducer Tool☆22Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆118Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- DEFCON 31 slide deck and video link☆58Updated 7 months ago
- ☆36Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆18Updated 3 weeks ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 2 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆110Updated 6 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆25Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated last year