fox-it / OpenSSH-Network-Parser
Project to decrypt and parse SSH traffic
☆60Updated 3 years ago
Related projects: ⓘ
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆77Updated 3 months ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆95Updated 3 years ago
- Cisco ASA Software and ASDM Security Research☆76Updated 2 years ago
- ☆53Updated 2 months ago
- CVE2020-0796 SMBv3 RCE☆60Updated 4 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆74Updated this week
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆88Updated last year
- ☆90Updated 2 years ago
- volatility explorer☆90Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated 11 months ago
- Scapy hands-on☆31Updated 10 months ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆70Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Passive Security Tools Fingerprinting Framework☆71Updated 3 years ago
- Linux EDR written in Golang and based on eBPF.☆229Updated 2 years ago
- convert ELF/DWARF symbol and type information into vol3's intermediate JSON☆95Updated 2 months ago
- Repository of yara rules☆45Updated 9 years ago
- Volatility Explorer Suit☆60Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated last month
- A ptrace POC by hooking SSH to reveal provided passwords☆174Updated 7 years ago
- bdvl☆100Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆27Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 2 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆22Updated 4 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆60Updated 7 years ago
- Windows symbol tables for Volatility 3☆72Updated 2 months ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆42Updated 2 years ago
- Zyxel password decrypter☆33Updated 2 years ago
- ☆101Updated last month