binarytrails / xprobe2
☆23Updated 4 years ago
Alternatives and similar repositories for xprobe2:
Users that are interested in xprobe2 are comparing it to the libraries listed below
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Some of the presentations given by me☆18Updated 5 months ago
- Python 3 library to request https://crt.sh/☆31Updated 4 months ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 7 years ago
- Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts☆26Updated 5 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- A collaborative, multi-platform, red teaming framework☆14Updated 5 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- A rogue DNS detector☆23Updated last year
- Advanced threat detection solution for Linux.☆36Updated 4 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆86Updated 10 months ago
- ☆23Updated last year
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Quickly generate suricata rules for IOCs☆29Updated 3 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- A scanner for taking basic fingerprints☆50Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- ☆22Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Exfiltration based on custom X509 certificates☆26Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- ☆28Updated 3 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Faraday's Command Line Interface☆45Updated 3 months ago