rfdslabs / Mimosa-Framework
Mimosa Framework to abuse EPC functionality on CISCO Routers.
☆30Updated 4 months ago
Alternatives and similar repositories for Mimosa-Framework:
Users that are interested in Mimosa-Framework are comparing it to the libraries listed below
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Configuration security audit framework☆23Updated 9 years ago
- ☆44Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- ☆27Updated 7 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- tundeep☆42Updated 5 years ago
- Independent file type identification python library☆12Updated 2 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- ☆16Updated 10 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 8 years ago
- ☆113Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago