MalwareTech / SpookySSLToolsLinks
Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)
☆43Updated 2 years ago
Alternatives and similar repositories for SpookySSLTools
Users that are interested in SpookySSLTools are comparing it to the libraries listed below
Sorting:
- Hackers Don't Give A Shit☆16Updated 5 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- ☆80Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Source code and examples for Antignis☆43Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 5 months ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆53Updated 2 years ago
- ☆15Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆58Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.☆22Updated 2 years ago
- ☆18Updated 9 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆98Updated 4 months ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆12Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆23Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆26Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago