MalwareTech / SpookySSLToolsLinks
Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)
☆43Updated 3 years ago
Alternatives and similar repositories for SpookySSLTools
Users that are interested in SpookySSLTools are comparing it to the libraries listed below
Sorting:
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Source code and examples for Antignis☆44Updated 3 years ago
- A VS Code extension to preview XML nmap output☆43Updated 10 months ago
- SMBScan is a tool to enumerate file shares on an internal network.☆49Updated last month
- ☆50Updated 5 months ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆58Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- ☆80Updated 2 years ago
- Rebuild of portspoof in GO with additional features.☆26Updated 2 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- POSIX script for mail security checks of domain names☆75Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆199Updated 3 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆35Updated 4 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆31Updated 2 years ago