MalwareTech / SpookySSLTools
Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)
☆41Updated 2 years ago
Alternatives and similar repositories for SpookySSLTools:
Users that are interested in SpookySSLTools are comparing it to the libraries listed below
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 10 months ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Source code and examples for Antignis☆36Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆49Updated 2 years ago
- ☆18Updated 5 months ago
- Bloodhound Portable for Windows☆51Updated last year
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆36Updated last year
- ☆15Updated 3 years ago
- DEbian Cve REproducer Tool☆22Updated last year
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- POSIX script for mail security checks of domain names☆75Updated last year
- Tools for attacking Azure Function Apps☆68Updated 4 months ago
- Silver SAML forgery tool☆49Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated last year
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated 2 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- Qemuno Framework☆24Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week