Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell detection training in future projects.
☆25Sep 16, 2018Updated 7 years ago
Alternatives and similar repositories for The-latest-webshell-collection
Users that are interested in The-latest-webshell-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- ☆17Oct 19, 2016Updated 9 years ago
- Javascript Botnet☆27Aug 14, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- ☆12Sep 18, 2016Updated 9 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- An authenticator that implements two-step verification service using the Time-base OTP algorithm. (CSE Project)☆12Apr 9, 2025Updated 11 months ago
- A tool for recover router password☆34Jun 19, 2018Updated 7 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CNC botnet developed via C☆17Dec 2, 2016Updated 9 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 3 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 7 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- A vnc client dll for c#, written in c/c++ and c#, depends on TightVnc 2.7.10, so it can use Tight to push screen faster than vncsharp use…☆18Nov 18, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.☆12Dec 19, 2021Updated 4 years ago
- Download and Execute PowerShell scripts on remote hosts with ease.☆24Jul 11, 2015Updated 10 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- Python application to scan user's installed browsers for secrets such as stored passwords and cookies.☆14Jun 16, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Reverse shell written on python3☆60Sep 16, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- A tool to run .Net DLLs from the command line☆105Oct 23, 2018Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago