MalwareTech / SpookySSLToolsLinks
Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)
☆43Updated 2 years ago
Alternatives and similar repositories for SpookySSLTools
Users that are interested in SpookySSLTools are comparing it to the libraries listed below
Sorting:
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Source code and examples for Antignis☆43Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆23Updated 11 months ago
- A VS Code extension to preview XML nmap output☆44Updated 4 months ago
- POSIX script for mail security checks of domain names☆75Updated last year
- ☆80Updated 2 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 6 months ago
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆58Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- ☆48Updated 5 months ago
- DEFCON 31 slide deck and video link☆64Updated last month
- create a "simulated internet" cyber range environment☆17Updated last month
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆52Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆11Updated 3 years ago
- ☆18Updated 8 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- some config files☆12Updated last month
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago