claroty / MMS-Stack-DetectorLinks
☆15Updated last year
Alternatives and similar repositories for MMS-Stack-Detector
Users that are interested in MMS-Stack-Detector are comparing it to the libraries listed below
Sorting:
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- A simple way to exfiltrate data using spotify API☆20Updated this week
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50Updated 8 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆52Updated 11 months ago
- ☆24Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Automatically exported from code.google.com/p/modscan☆29Updated 10 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- ☆42Updated 10 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- ☆11Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 8 months ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- ☆27Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Still point in moving world.☆49Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Updated 4 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Updated 4 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- A rogue DNS detector☆24Updated 2 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago