fox-it / cisco-ios-xe-implant-detectionLinks
Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)
☆37Updated last year
Alternatives and similar repositories for cisco-ios-xe-implant-detection
Users that are interested in cisco-ios-xe-implant-detection are comparing it to the libraries listed below
Sorting:
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Linux #rootkit and #malware revealer☆25Updated 10 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆32Updated 2 years ago
- Look into EDR events from network☆23Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆30Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- ShellSweeping the evil.☆52Updated 11 months ago
- Living off the False Positive!☆37Updated 4 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- create a "simulated internet" cyber range environment☆16Updated last week
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆32Updated last year
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 5 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 4 months ago
- Open IOC sharing platform☆56Updated 6 months ago
- ☆37Updated last year
- Yara Rules for Modern Malware☆77Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 10 months ago
- Living Off Security Tools☆45Updated 7 months ago
- ☆80Updated 2 years ago
- ☆42Updated last year
- Contains compiled binaries of Volatility☆33Updated 2 weeks ago
- A home for detection content developed by the delivr.to team☆69Updated this week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago