advanced-threat-research / CreosoteLinks
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
☆82Updated 3 years ago
Alternatives and similar repositories for Creosote
Users that are interested in Creosote are comparing it to the libraries listed below
Sorting:
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆135Updated this week
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- ☆211Updated 3 months ago
- ☆104Updated 2 years ago
- Artifacts to the ALPACA attack.☆60Updated 3 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆44Updated last week
- ☆49Updated 2 months ago
- PCAP visualization tool☆104Updated 2 years ago
- ☆169Updated 2 years ago
- CveXplore☆42Updated last month
- CQ, a code security scanner☆100Updated last year
- Security tools report parsers for Faradaysec.com☆55Updated 2 weeks ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- ☆63Updated 2 years ago
- ☆116Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- ☆41Updated 3 years ago
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆108Updated 2 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆203Updated this week
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 5 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 2 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- Tool to guess CPE name based on common software name☆104Updated last month
- Tools for investigating Log4j CVE-2021-44228☆94Updated 3 years ago
- ☆113Updated 2 years ago