advanced-threat-research / CreosoteLinks
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
☆84Updated 2 years ago
Alternatives and similar repositories for Creosote
Users that are interested in Creosote are comparing it to the libraries listed below
Sorting:
- ☆48Updated 5 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆127Updated 7 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆41Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Python utility to generate filesystem content for Obsidian.☆86Updated last year
- DEbian Cve REproducer Tool☆25Updated last week
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆249Updated 2 years ago
- Security Information and Event Management in Minecraft☆119Updated 3 years ago
- ☆63Updated 2 years ago
- Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and m…☆107Updated 3 years ago
- CQ, a code security scanner☆100Updated last year
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- ☆115Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆296Updated this week
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆35Updated 2 years ago
- CveXplore☆40Updated 2 weeks ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- boostsecurityio/lotp☆126Updated 2 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- ☆104Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- sner4 LEGACY repository, see https://github.com/snerstack/sner-monorepo for current versions☆14Updated 10 months ago
- ☆47Updated 2 years ago
- ☆80Updated 2 years ago