yunuscadirci / DIALStrangerLinks
details about DIAL protocol vulnerabilities
☆28Updated last year
Alternatives and similar repositories for DIALStranger
Users that are interested in DIALStranger are comparing it to the libraries listed below
Sorting:
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- ☆26Updated last year
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆16Updated 3 months ago
- ☆16Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 10 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 9 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 5 months ago
- self-hosted Azure OSINT tool☆31Updated last month
- Dont Gamble with Risk☆14Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 3 months ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- ☆12Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 3 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- Golang Shlyuz Implant Implementation☆13Updated 2 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- ☆18Updated last year
- wordlists for password cracking☆28Updated 2 years ago
- A C# Tool to gather information about email breaches☆14Updated last year