vonahisec / CVE-2022-47966-ScanView external linksLinks
Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.
☆28Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2022-47966-Scan
Users that are interested in CVE-2022-47966-Scan are comparing it to the libraries listed below
Sorting:
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 3 weeks ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆128Jan 19, 2023Updated 3 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Mar 13, 2025Updated 11 months ago
- Open-Source Phishing Toolkit☆19May 23, 2021Updated 4 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Jan 12, 2026Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- μετάμάσκα - malevolent payload classifier☆23Jun 29, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- ☆65Dec 9, 2021Updated 4 years ago
- boostsecurityio/lotp☆138Jan 25, 2026Updated 2 weeks ago
- ☆31Mar 21, 2023Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- ☆12Feb 2, 2026Updated last week
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 8 months ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 4 months ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Nov 23, 2023Updated 2 years ago
- ☆44Feb 6, 2025Updated last year
- ☆35Jun 21, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- aws cli pentesting/red team snippets☆32Jan 12, 2024Updated 2 years ago