rfdslabs / Mimosa-Framework
Mimosa Framework to abuse EPC functionality on CISCO Routers.
☆30Updated last month
Alternatives and similar repositories for Mimosa-Framework:
Users that are interested in Mimosa-Framework are comparing it to the libraries listed below
- Configuration security audit framework☆23Updated 8 years ago
- ☆27Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Frontend for Codex Gigas☆21Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- ☆19Updated 6 years ago
- ☆74Updated 2 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- ☆45Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- ☆25Updated 8 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 8 years ago
- Independent file type identification python library☆12Updated last year
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- ☆17Updated 10 years ago