veorq / blueflowerView external linksLinks
a grep -r for secrets
☆179May 4, 2022Updated 3 years ago
Alternatives and similar repositories for blueflower
Users that are interested in blueflower are comparing it to the libraries listed below
Sorting:
- Scapy hands-on at #GreHack16☆15Nov 19, 2016Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆242Sep 13, 2021Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Oct 6, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- The modular distributed fingerprinting engine☆219Aug 6, 2018Updated 7 years ago
- C++-based shellcode builder☆115Nov 19, 2020Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- HTTP-traceroute in Go☆19Oct 19, 2015Updated 10 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Modular file scanning/analysis framework☆621Oct 8, 2019Updated 6 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Tool for scanning Cisco router products over SSH☆55Dec 17, 2014Updated 11 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago