Aldenar / salt-malware-sourcesLinks
Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analysis of other infected machines
☆13Updated 5 years ago
Alternatives and similar repositories for salt-malware-sources
Users that are interested in salt-malware-sources are comparing it to the libraries listed below
Sorting:
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Golang port for Metasploit's pattern_create and pattern_offset☆13Updated 4 years ago
- ☆16Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A 'find' for S3 public buckets☆11Updated 8 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- VSCode Extension for Deciduous☆9Updated 6 months ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Provides an easy way to collect and send Slack access & integration logs.☆13Updated 3 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Defensive S3 Bucket Squating☆30Updated 7 years ago
- the puppy proxy☆22Updated 5 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Provides access to libhashcat☆30Updated last year
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago