wllm-rbnt / asn1template
A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_generate_nconf(3) function
☆20Updated last month
Alternatives and similar repositories for asn1template:
Users that are interested in asn1template are comparing it to the libraries listed below
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- ☆24Updated 9 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last month
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆18Updated last week
- Python CLI and module for CIRCL hash lookup☆12Updated 2 weeks ago
- Polyglot detector☆21Updated 10 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- ☆18Updated 11 months ago
- Golang Shlyuz Implant Implementation☆12Updated last year
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 3 weeks ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- Set of tools to analyze Tinynuke samples☆15Updated 3 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 3 weeks ago
- A rogue DNS detector☆23Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- ☆31Updated 3 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 2 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago