gsmith257-cyber / Smishing-Triad
Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024
☆10Updated 9 months ago
Alternatives and similar repositories for Smishing-Triad:
Users that are interested in Smishing-Triad are comparing it to the libraries listed below
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 8 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- Sample code for finding AWS Account ID of an S3 bucket.☆50Updated 11 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Silly proof-of-concept for a PDF chatroom☆21Updated last year
- Unified interface for some crypto algos☆12Updated last year
- VSCode Extension for Deciduous☆9Updated 2 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated this week
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆20Updated this week
- Create machine images containing the Guacamole remote desktop gateway☆10Updated 3 weeks ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆18Updated 11 months ago
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- Python CLI and module for CIRCL hash lookup☆12Updated 2 weeks ago
- Parser for Windows PowerShell script block logs☆13Updated last month
- Automated pshtt, trustymail, and sslyze scanning☆25Updated this week
- Microsoft Developer Blogs Search Tool☆24Updated 3 months ago
- ☆17Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated 3 months ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated last year
- porglet development repo☆12Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 weeks ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Fuzz Network Traffic☆18Updated last month
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 2 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago