Aldenar / salt-malware-sources
Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analysis of other infected machines
☆13Updated 4 years ago
Alternatives and similar repositories for salt-malware-sources:
Users that are interested in salt-malware-sources are comparing it to the libraries listed below
- Extract, defang, resolve names and IPs from text☆23Updated last year
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Notebook collection☆10Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 4 years ago
- egrets monitors egress☆45Updated 4 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆28Updated 6 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Updated 2 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- ☆16Updated 4 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 5 months ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Custom semgrep rules registry☆11Updated 2 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- A list of backdoor samples I find online.☆13Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago