claroty / MMS-Stack-DetectorLinks
☆15Updated last year
Alternatives and similar repositories for MMS-Stack-Detector
Users that are interested in MMS-Stack-Detector are comparing it to the libraries listed below
Sorting:
- A simple way to exfiltrate data using spotify API☆18Updated 3 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ☆42Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 5 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- ☆24Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆20Updated 3 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- ☆24Updated 2 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆25Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Presentaciones de congresos☆53Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 10 months ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated last year
- ☆27Updated 11 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 3 years ago