vulncheck-oss / cisco-ios-xe-implant-scanner
A go-exploit to scan for implanted Cisco IOS XE Systems
☆40Updated 2 months ago
Alternatives and similar repositories for cisco-ios-xe-implant-scanner:
Users that are interested in cisco-ios-xe-implant-scanner are comparing it to the libraries listed below
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- ☆29Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆34Updated 10 months ago
- Living Off Security Tools☆43Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- All kinds of tiny shells☆58Updated last year
- create a "simulated internet" cyber range environment☆15Updated 3 months ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆11Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A user enumeration tool for Slack.☆24Updated 7 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆56Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 5 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- ☆31Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- ASR Configurator, Essentials and Atomic Testing☆36Updated 2 months ago
- https://lolad-project.github.io/☆68Updated 2 weeks ago
- ☆17Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 7 months ago
- ☆78Updated 9 months ago
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆31Updated last year
- Yara Rules for Modern Malware☆73Updated 10 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year