TelefonicaTC2Tech / packagednaLinks
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicio…
☆69Updated 4 years ago
Alternatives and similar repositories for packagedna
Users that are interested in packagedna are comparing it to the libraries listed below
Sorting:
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆42Updated 5 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Presentations from the CX Security Labs team☆34Updated 2 months ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆76Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Slides and materials for conference presentations☆11Updated 2 years ago
- Typodetect☆74Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆20Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- Ideaslocas Repository☆37Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago