NetWatch-team / Daily-Attack-SummaryLinks
This repository contains a daily export of all IPs that have been targeting NetWatch sensors as well as all used usernames and passwords
☆40Updated 5 months ago
Alternatives and similar repositories for Daily-Attack-Summary
Users that are interested in Daily-Attack-Summary are comparing it to the libraries listed below
Sorting:
- ☆105Updated last month
- Tools for finding SMTP smuggling vulnerabilities.☆143Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆122Updated 3 years ago
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆65Updated 2 months ago
- KeyTrap (DNSSEC)☆44Updated last year
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆52Updated 11 months ago
- Trends Website (URL) from Twitter hackers.☆112Updated this week
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- A fingerprint generation helper for nuclei network templates☆80Updated 3 years ago
- Look into EDR events from network☆25Updated 2 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).☆84Updated 3 years ago
- eBPF-based EDR for Linux☆18Updated last year
- Signing-key abuse and update exploitation framework☆132Updated 8 months ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆22Updated last year
- Tiny embeddable dns server☆56Updated last week
- CVE-2025-1974☆90Updated 10 months ago
- Repository of CVE found by OCD people☆83Updated 7 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Updated 2 years ago
- reverse shell using curl☆216Updated 11 months ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated 2 years ago
- Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.☆34Updated 3 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- Agent responsible for detecting remote vulnerabilities, a robust scanner.☆36Updated last month
- Find what egress ports are allowed☆46Updated 2 months ago
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆85Updated 2 years ago