airbus-seclab / ilo4_toolbox
Toolbox for HPE iLO4 & iLO5 analysis
☆419Updated last year
Alternatives and similar repositories for ilo4_toolbox:
Users that are interested in ilo4_toolbox are comparing it to the libraries listed below
- Database of private SSL/SSH keys for embedded devices☆255Updated 11 months ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆225Updated 6 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆240Updated 7 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆219Updated 5 years ago
- Automated Linux evil maid attack☆423Updated 9 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆208Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆595Updated 7 months ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆160Updated 4 years ago
- rVMI - A New Paradigm For Full System Analysis☆352Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆256Updated 3 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆230Updated 10 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆533Updated 10 months ago
- collection of verified Linux kernel exploits☆186Updated 4 years ago
- Easy 802.1Q VLAN Hopping☆372Updated 8 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆206Updated 6 years ago
- Encrypted exploit delivery for the masses☆262Updated 5 years ago
- ☆602Updated 2 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆474Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆219Updated 5 years ago
- ☆228Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- A fully functional DanderSpritz lab in 2 commands☆423Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆255Updated 4 years ago
- Scans for accessibility tools backdoors via RDP☆334Updated 6 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆240Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆133Updated 4 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆174Updated 6 years ago