t4d / HSRPwn
Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration
☆17Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for HSRPwn
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- ☆22Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆54Updated 7 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Setting up a training environment for MISP☆11Updated last year
- Cisco AMP threat hunting scripts☆14Updated 3 weeks ago
- Hashes of infamous malware☆26Updated last year
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- ☆15Updated 2 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ☆24Updated 2 years ago
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- Can you pay the ransom in your country?☆14Updated 11 months ago
- ☆12Updated 5 years ago
- ☆24Updated this week
- Yara rules for malicious javascript files from public repositories or written by me.☆12Updated 3 years ago
- volatility-runner is a command line application designed to speed up memory forensics using the volatility framework, primarily for insta…☆11Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 2 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆17Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated last year