Shadow0ps / CVE-2023-20198-ScannerLinks
This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273
☆30Updated last year
Alternatives and similar repositories for CVE-2023-20198-Scanner
Users that are interested in CVE-2023-20198-Scanner are comparing it to the libraries listed below
Sorting:
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 5 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- ☆35Updated last year
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- ☆32Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆51Updated last year
- ☆70Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Retrieve AD accounts description and search for password in it☆83Updated 3 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 9 months ago
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆25Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 6 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 11 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- ☆77Updated last year
- ☆54Updated 7 months ago
- IP address filter by City☆11Updated 6 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 10 months ago