vulncheck-oss / cisco-ios-xe-implant-scannerView external linksLinks
A go-exploit to scan for implanted Cisco IOS XE Systems
☆41Oct 28, 2024Updated last year
Alternatives and similar repositories for cisco-ios-xe-implant-scanner
Users that are interested in cisco-ios-xe-implant-scanner are comparing it to the libraries listed below
Sorting:
- ☆24Oct 18, 2022Updated 3 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆12Jan 26, 2025Updated last year
- An amateur radio fox transmitter for fox hunting☆18Nov 24, 2025Updated 2 months ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- ☆72Feb 4, 2026Updated last week
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- ☆20Jun 24, 2017Updated 8 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Exploiting the xmlrpc.php on all WordPress versions☆26Nov 4, 2022Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- ☆48Jul 30, 2025Updated 6 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- ☆129Mar 1, 2023Updated 2 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆157Dec 31, 2025Updated last month
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 7 months ago
- ☆38Jan 14, 2022Updated 4 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆39Oct 6, 2021Updated 4 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago
- tool for identifying guest relationships between companies☆102Jun 27, 2024Updated last year
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Oct 20, 2022Updated 3 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago