fox-it / cisco-ios-xe-implant-detectionView external linksLinks
Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)
☆41Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for cisco-ios-xe-implant-detection
Users that are interested in cisco-ios-xe-implant-detection are comparing it to the libraries listed below
Sorting:
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Easy to use and open-source unknown stealer☆22Jul 24, 2023Updated 2 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆26Jun 11, 2025Updated 8 months ago
- Vagrant setup and configuration files for multi-vendor configuration of various topologies and technologies☆19Jan 14, 2026Updated last month
- This repository contains various demos of Nokia automation via all possible interfaces with Python.☆14Dec 18, 2021Updated 4 years ago
- Arista EOS gNMI AI Assistant☆10Dec 23, 2024Updated last year
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- Scripts and instructions on how to integrate Forward and NetBox for Asset Inventory sync☆14May 15, 2025Updated 9 months ago
- ☆12Feb 24, 2023Updated 2 years ago
- ☆16Jan 22, 2026Updated 3 weeks ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated last year
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- A modified fork of Be.HexEditor for use in debug tools☆14Jan 5, 2022Updated 4 years ago
- ☆12May 23, 2025Updated 8 months ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- ☆12Jun 6, 2025Updated 8 months ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Oct 1, 2023Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Dec 30, 2025Updated last month
- ansible wrapper to generate dynamic ContainerLab topology files with to facilitate team labbing and learning☆14Jul 24, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago