advanced-threat-research / CreosoteLinks
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
☆84Updated 2 years ago
Alternatives and similar repositories for Creosote
Users that are interested in Creosote are comparing it to the libraries listed below
Sorting:
- ☆104Updated 2 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆86Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and m…☆108Updated 3 years ago
- Security Information and Event Management in Minecraft☆118Updated 2 years ago
- ☆243Updated 10 months ago
- ☆169Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆248Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- CveXplore☆40Updated 2 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆126Updated 7 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆120Updated this week
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆127Updated 5 months ago
- boostsecurityio/lotp☆126Updated last month
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Artifacts to the ALPACA attack.☆60Updated 3 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- Monthly CVE Stats☆42Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- ☆82Updated last year
- Visual Studio Code extension for MITRE ATT&CK☆54Updated 11 months ago
- This repo scans pypi for AWS keys☆106Updated last year
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- CQ, a code security scanner☆100Updated last year
- ☆111Updated 2 years ago