Permiso-io-tools / DetentionDodgerView external linksLinks
☆18Jan 31, 2025Updated last year
Alternatives and similar repositories for DetentionDodger
Users that are interested in DetentionDodger are comparing it to the libraries listed below
Sorting:
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆23Sep 20, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆15Nov 6, 2025Updated 3 months ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 4 years ago
- ☆53Feb 4, 2025Updated last year
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 2 months ago
- ☆26May 6, 2024Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- ☆23Sep 12, 2024Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆25Apr 8, 2019Updated 6 years ago
- Random source codes☆26Dec 22, 2025Updated last month
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 2 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 2 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- ☆29Jan 31, 2025Updated last year
- Installing wazuh SIEM Unified XDR and SIEM protection☆31Jun 3, 2025Updated 8 months ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- machofile is a module to parse Mach-O binary files☆91Updated this week
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 4 months ago
- ☆78Jan 15, 2026Updated 3 weeks ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- ☆33Jun 12, 2024Updated last year
- ☆30Jan 13, 2026Updated last month
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year