yunuscadirci / DIALStrangerLinks
details about DIAL protocol vulnerabilities
☆30Updated last year
Alternatives and similar repositories for DIALStranger
Users that are interested in DIALStranger are comparing it to the libraries listed below
Sorting:
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- ☆16Updated 7 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- ☆26Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Updated 4 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated 11 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- wordlists for password cracking☆28Updated 3 years ago
- visually see issues with supported cipher suites☆16Updated last year
- ☆16Updated 4 months ago
- ☆25Updated last year
- self-hosted Azure OSINT tool☆31Updated 2 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Dont Gamble with Risk☆14Updated last year
- ☆20Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Golang Shlyuz Implant Implementation☆13Updated 3 months ago
- A C# Tool to gather information about email breaches☆15Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 10 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 10 months ago