A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.
☆45Mar 8, 2024Updated last year
Alternatives and similar repositories for Checker
Users that are interested in Checker are comparing it to the libraries listed below
Sorting:
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- ☆124Aug 24, 2025Updated 6 months ago
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- NetProbe: Network Probe☆173Oct 13, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Updated this week
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆172Jul 30, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆120Jan 30, 2024Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Nov 22, 2024Updated last year
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Feb 2, 2024Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- Tool designed for fetching, validating, and storing working proxies.☆258Nov 20, 2025Updated 3 months ago