anirudhduggal / medauditLinks
A tool for auditing medical devices and healthcare infrastructure
☆20Updated 2 years ago
Alternatives and similar repositories for medaudit
Users that are interested in medaudit are comparing it to the libraries listed below
Sorting:
- ☆38Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆14Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆44Updated 8 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- ☆36Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- ☆24Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Scripts for OSCE☆18Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago