mbcrump / CVE-2021-3156
Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo
☆39Updated 4 years ago
Alternatives and similar repositories for CVE-2021-3156
Users that are interested in CVE-2021-3156 are comparing it to the libraries listed below
Sorting:
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- A Passive SSH back-end and scanner.☆102Updated 2 months ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- A collection of captured SSH login credentials☆16Updated 4 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- ☆19Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A tool suite for use during system assessments.☆35Updated 3 weeks ago
- ☆18Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆15Updated last month
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆68Updated 5 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 months ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- RDP honeypot☆66Updated 5 years ago
- Take a word list and convert 1337 spellings back to normal☆11Updated 7 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 5 years ago