yoryio / ShodanFavicon
List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.
☆18Updated 5 months ago
Related projects: ⓘ
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- ☆50Updated 7 months ago
- ☆50Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆29Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated 7 months ago
- ☆46Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆32Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆20Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 9 months ago
- vulnlab.com reaper writeup☆25Updated last year
- ☆14Updated last year
- Azure Service Subdomain Enumeration☆39Updated 2 weeks ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆31Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆50Updated 3 weeks ago
- Tools used for Pentesting☆22Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆15Updated last year
- Tool for scanning domains for .git directories.☆13Updated 11 months ago
- A small red team course☆32Updated last year
- ☆12Updated 4 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ☆19Updated this week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- BloodHound PowerShell client☆43Updated this week
- ☆23Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Cobalt Strike BOFS☆16Updated 8 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated 7 months ago