A go-exploit to scan for implanted Cisco IOS XE Systems
☆41Oct 28, 2024Updated last year
Alternatives and similar repositories for cisco-ios-xe-implant-scanner
Users that are interested in cisco-ios-xe-implant-scanner are comparing it to the libraries listed below
Sorting:
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated 2 months ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- A collection of exercises for practicing what is taught in Genki: An Integrated Course in Elementary Japanese.☆23Sep 12, 2025Updated 5 months ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Exploiting the xmlrpc.php on all WordPress versions☆26Nov 4, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Pass-thru web server for traffic redirection☆28May 6, 2019Updated 6 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- ☆48Jul 30, 2025Updated 7 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- ☆128Mar 1, 2023Updated 3 years ago
- Code and Website For PatchThis.app☆32Updated this week
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- ☆13Aug 5, 2025Updated 7 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆134May 8, 2024Updated last year
- ☆10May 31, 2015Updated 10 years ago
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated last week
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 3 years ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆158Dec 31, 2025Updated 2 months ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 8 months ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆91Nov 19, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year