advanced-threat-research / CreosoteLinks
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
☆84Updated 2 years ago
Alternatives and similar repositories for Creosote
Users that are interested in Creosote are comparing it to the libraries listed below
Sorting:
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- PCAP visualization tool☆103Updated 2 years ago
- ☆169Updated 2 years ago
- ☆208Updated last month
- A server providing RESTful access to CyberChef☆152Updated 5 months ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- IOCs published by Black Lotus Labs☆122Updated 2 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆253Updated 2 years ago
- ☆49Updated last week
- Signature based honeypot detector tool written in Golang☆99Updated 4 months ago
- ☆104Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated last year
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- PoC_CVEs☆162Updated last month
- CveXplore☆42Updated last week
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- ☆99Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Tool to guess CPE name based on common software name☆101Updated 8 months ago
- ☆134Updated last year
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- ☆116Updated 2 years ago
- Artifacts for the Black Hat talk.☆105Updated 5 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Artifacts to the ALPACA attack.☆60Updated 3 years ago
- A toolbox for extracting RSA private keys from public keys.☆186Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 months ago
- ☆63Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago