vulncheck-oss / cisco-ios-xe-implant-scanner
A go-exploit to scan for implanted Cisco IOS XE Systems
☆40Updated 3 months ago
Alternatives and similar repositories for cisco-ios-xe-implant-scanner:
Users that are interested in cisco-ios-xe-implant-scanner are comparing it to the libraries listed below
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆47Updated this week
- ☆32Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆79Updated last year
- ☆29Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆32Updated 10 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Yara Rules for Modern Malware☆73Updated 11 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Citrix Scanner for CVE-2023-3519☆49Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 6 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 8 months ago
- ☆41Updated 10 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 7 months ago
- URL fingerprinting made easy☆85Updated 10 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- C2 Active Scanner☆52Updated 8 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago