fox-it / cisco-ios-xe-implant-detectionLinks
Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)
☆39Updated last year
Alternatives and similar repositories for cisco-ios-xe-implant-detection
Users that are interested in cisco-ios-xe-implant-detection are comparing it to the libraries listed below
Sorting:
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- ☆80Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- ShellSweeping the evil.☆53Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 6 months ago
- Living off the False Positive!☆37Updated 5 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 3 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- PowerShell Script Analyzer☆69Updated last year
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- create a "simulated internet" cyber range environment☆17Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago
- ☆32Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- Detection rule validation☆41Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- God Mode Detection Rules☆134Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- General Content☆26Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- A go-exploit to scan for implanted Cisco IOS XE Systems☆42Updated 8 months ago