NetWatch-team / Daily-Attack-SummaryLinks
☆34Updated last month
Alternatives and similar repositories for Daily-Attack-Summary
Users that are interested in Daily-Attack-Summary are comparing it to the libraries listed below
Sorting:
- ☆104Updated 3 months ago
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- LDAP Swiss Army Knife☆49Updated last year
- Tools for finding SMTP smuggling vulnerabilities.☆128Updated last year
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆51Updated this week
- Repository of CVE found by OCD people☆77Updated last month
- ☆22Updated 2 months ago
- A fingerprint generation helper for nuclei network templates☆75Updated 2 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Signing-key abuse and update exploitation framework☆129Updated 2 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆84Updated 10 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- KeyTrap (DNSSEC)☆41Updated last year
- Worlds First Public POC for CVE-2025-1974☆89Updated 3 months ago
- Find what egress ports are allowed☆42Updated 2 years ago
- ☆105Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated this week
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆19Updated 11 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆53Updated last month
- 🌒 Shell command obfuscation to avoid detection systems☆125Updated 2 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆170Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- Cloud Exploit Framework☆114Updated 3 years ago
- ☆104Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- ☆80Updated 2 years ago