krystianbajno / cveseekerLinks
π Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple sources.
β36Updated last month
Alternatives and similar repositories for cveseeker
Users that are interested in cveseeker are comparing it to the libraries listed below
Sorting:
- Collection of Tools & Techniques for analyzing URLsβ33Updated 2 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.β34Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alertsβ125Updated 2 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.β53Updated 2 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.β34Updated last year
- β84Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, aloβ¦β91Updated 5 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europeβ37Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), aβ¦β53Updated 9 months ago
- https://lolad-project.github.io/β83Updated last year
- β35Updated 2 years ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.β72Updated last month
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.β35Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It empβ¦β79Updated 3 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both β¦β42Updated last year
- Some of my rough notes for Docker threat detectionβ47Updated 2 years ago
- Default Detections for EDRβ97Updated last year
- β24Updated 10 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if yβ¦β99Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.β189Updated 3 weeks ago
- CIS Benchmark testing of Windows SIEM configurationβ45Updated 2 years ago
- DEFCON 31 slide deck and video linkβ66Updated 7 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.β40Updated 3 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalβ¦β91Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.β28Updated 2 years ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identifyβ¦β78Updated last week
- create a "simulated internet" cyber range environmentβ19Updated 7 months ago
- A user enumeration tool for Slack.β34Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!β33Updated last month
- Deploy a phishing infrastructure on the fly.β78Updated last year