Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell detection training in future projects.
☆25Sep 16, 2018Updated 7 years ago
Alternatives and similar repositories for The-latest-webshell-collection
Users that are interested in The-latest-webshell-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- ☆17Oct 19, 2016Updated 9 years ago
- Javascript Botnet☆27Aug 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- This repository contains a skeleton to setup the ChirpStack open-source LoRaWAN Network Server stack using kubernetes.☆14Mar 5, 2024Updated 2 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- A tool for recover router password☆34Jun 19, 2018Updated 7 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 4 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 7 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- .NET decompiler/disassembler with editors that allows to change and compile the code back into the assembly☆20Feb 1, 2022Updated 4 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Apr 14, 2014Updated 12 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 6 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆42Dec 18, 2024Updated last year
- Download and Execute PowerShell scripts on remote hosts with ease.☆24Jul 11, 2015Updated 10 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Python application to scan user's installed browsers for secrets such as stored passwords and cookies.☆14Jun 16, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆26May 20, 2022Updated 3 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated 2 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 24, 2026Updated 3 weeks ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago