sud0woodo / Urgent11-Suricata-LUA-scripts
Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260
☆19Updated 5 years ago
Alternatives and similar repositories for Urgent11-Suricata-LUA-scripts
Users that are interested in Urgent11-Suricata-LUA-scripts are comparing it to the libraries listed below
Sorting:
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- Tool to test for existence of CVE-2020-8218☆22Updated 4 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Security Research☆36Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated 2 years ago
- ☆52Updated 5 years ago
- initial commit☆44Updated 5 months ago
- Is this IP a C2 server?☆28Updated 5 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆16Updated 6 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- CVE-2019-12949☆26Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 4 years ago
- ☆25Updated 4 years ago
- Work in Progress repo☆14Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- various slides and presentations I've worked on☆18Updated last month
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago