target / POSSUMLinks
☆33Updated last month
Alternatives and similar repositories for POSSUM
Users that are interested in POSSUM are comparing it to the libraries listed below
Sorting:
- An simplest PE parser, which list all import and export entries☆12Updated 7 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 11 months ago
- Hosting PowerShell in Python☆42Updated 3 years ago
- A C DLL that can control powershell☆51Updated 6 years ago
- Asynchronous NFSv3 client in pure Python☆28Updated 6 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Updated last year
- ☆14Updated last month
- Tools for attacking Azure Function Apps☆88Updated 3 months ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Updated 2 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 6 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- Generate realistic-looking fake meetings to fill up your Microsoft Outlook/Apple/Google calendar. Available in Python and PowerShell.☆32Updated 2 years ago
- ☆28Updated 5 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆40Updated this week
- Golang-based SDK to CrowdStrike's APIs☆79Updated this week
- Azure Offensive Library☆17Updated 3 months ago
- ☆28Updated 4 months ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Updated 4 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Updated 2 weeks ago
- A security-first linter for code that shouldn't need linting☆17Updated 2 years ago
- ☆43Updated 6 months ago
- Universal Profiling as a desktop app☆100Updated this week
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆70Updated 4 months ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Updated last year
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆97Updated last week
- AWS STS token decoder☆46Updated 10 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆75Updated last year
- An offensive toolkit for restless guests #DEFCON33☆54Updated 6 months ago