citizenlab / bluecoat-investigations
Investigation data from two reports around the Blue Coat networking kit.
☆17Updated 11 years ago
Alternatives and similar repositories for bluecoat-investigations:
Users that are interested in bluecoat-investigations are comparing it to the libraries listed below
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- ☆37Updated 10 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- ☆15Updated 8 years ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- See here:☆42Updated 12 years ago
- Format string exploit generation☆10Updated 9 years ago
- A curated list of tools for incident response☆29Updated last year
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago