advanced-threat-research / CreosoteLinks
Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.
☆82Updated 3 years ago
Alternatives and similar repositories for Creosote
Users that are interested in Creosote are comparing it to the libraries listed below
Sorting:
- Tools for investigating Log4j CVE-2021-44228☆95Updated 4 years ago
- PCAP visualization tool☆104Updated 2 years ago
- ☆50Updated 6 months ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- ☆212Updated last week
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- A server providing RESTful access to CyberChef☆165Updated 11 months ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- Detections for CVE-2021-44228 inside of nested binaries☆35Updated 4 years ago
- Security Information and Event Management in Minecraft☆118Updated 3 years ago
- IOCs published by Black Lotus Labs☆124Updated 3 months ago
- ☆170Updated 3 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- Data visualization for blue teams☆126Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- ☆41Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 3 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆144Updated this week
- QuickSand document and PDF malware analysis tool written in Python☆136Updated 3 months ago
- CveXplore☆42Updated 4 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago