fedisecfeeds / fedisecfeeds.github.ioLinks
☆22Updated this week
Alternatives and similar repositories for fedisecfeeds.github.io
Users that are interested in fedisecfeeds.github.io are comparing it to the libraries listed below
Sorting:
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- PowerShell Script Analyzer☆70Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- ☆18Updated last year
- https://lolad-project.github.io/☆84Updated last year
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Thor Artifacts for Velociraptor☆19Updated 2 months ago
- Find what egress ports are allowed☆46Updated 2 months ago
- Yara Rules for Modern Malware☆78Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Updated 3 years ago
- AutoPoC Generator HoneyPoC☆36Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- ☆31Updated 2 years ago
- ☆25Updated 2 years ago