dogancanbakir / metamaska
μετάμάσκα - malevolent payload classifier
☆23Updated last year
Alternatives and similar repositories for metamaska:
Users that are interested in metamaska are comparing it to the libraries listed below
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆14Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆18Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- ☆16Updated 8 months ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 weeks ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last month
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- parsers to make life easier☆12Updated 4 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 9 months ago
- Domain Enrichment Toolkit $ pip install richkit☆11Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 2 months ago