TelefonicaTC2Tech / packagednaLinks
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicio…
☆68Updated 4 years ago
Alternatives and similar repositories for packagedna
Users that are interested in packagedna are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- ☆42Updated 4 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Presentations from the CX Security Labs team☆34Updated last month
- Core A2P2V functionality (command line based)☆68Updated last year
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆54Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- ☆80Updated 2 years ago
- Typodetect☆74Updated 4 years ago
- Ideaslocas Repository☆37Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated last week
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago