advanced-threat-research / Creosote
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
☆83Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Creosote
- ☆167Updated 2 years ago
- PCAP visualization tool☆101Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago
- ☆63Updated last year
- ☆48Updated 7 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- ☆115Updated last year
- Signature based honeypot detector tool written in Golang☆84Updated 6 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆126Updated 6 months ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆140Updated last year
- ☆192Updated last month
- ☆104Updated 2 years ago
- A curated list of argument injection vectors☆37Updated 2 months ago
- Coverage-based fuzzer for python applications☆233Updated 2 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 4 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆240Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- ☆129Updated 7 months ago
- Static Token And Credential Scanner☆95Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆153Updated last year
- Tools for investigating Log4j CVE-2021-44228☆94Updated 2 years ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆78Updated last year
- CQ, a code security scanner☆97Updated 6 months ago
- Hfinger - fingerprinting HTTP requests☆132Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year