ATT&CK Models of the Threat Actor "Phineas Fisher"
☆13Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for Viva-Phineas-Fisher
Users that are interested in Viva-Phineas-Fisher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 24, 2020Updated 5 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Aug 14, 2019Updated 6 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- Repo for my YouTube series about Claude Code essentials☆16Sep 18, 2025Updated 6 months ago
- The study of skiing where we shred open data like pow. Quantifying alpine ski areas with geospatial metrics derived from OpenStreetMap.☆21Updated this week
- List of awesome starred repositories☆14Updated this week
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- ☆11Dec 22, 2023Updated 2 years ago
- CyberSec Blog☆100Updated this week
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- 5025 configs openbullet/silverbullet☆14Mar 5, 2023Updated 3 years ago
- Custom config.☆20May 17, 2023Updated 2 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Aug 17, 2022Updated 3 years ago
- ☆48Jul 19, 2024Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Jan 8, 2023Updated 3 years ago
- Fast and customizable Firebase api and Project ID extractor .☆18Dec 10, 2023Updated 2 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Reconizer is all-in-one subdomain enumeration tool that has capabilities to find the maximum number of subdomains of a root domain.☆18Jul 14, 2024Updated last year
- GitHub repository that analyzes Meta's binary transparency archives for security researchers☆22Oct 6, 2024Updated last year
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆31Jun 11, 2023Updated 2 years ago
- UUID issues for Burp Suite☆54Jun 2, 2022Updated 3 years ago
- A very simple Flask application that demonstrates how to integrate OpenID connect into user session management.☆12Jul 5, 2018Updated 7 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- Minimalist generator of random strings, numbers, etc.☆29Nov 1, 2018Updated 7 years ago
- Hiding a message in a data table such as a CSV or parquet file☆13Mar 2, 2026Updated 3 weeks ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- 最近很火的SSLvpn的安全设备通杀☆27Dec 15, 2023Updated 2 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)☆13Jun 10, 2021Updated 4 years ago
- A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor☆34Nov 17, 2022Updated 3 years ago
- Hacker News ranked by Comment/Score ratio☆29Updated this week
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year