Scan web server for known webshell names and responses
☆50Sep 12, 2016Updated 9 years ago
Alternatives and similar repositories for webshell-intel
Users that are interested in webshell-intel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 5 months ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- A webshell helps script kiddies to bypass disable_functions☆18May 26, 2018Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email☆11Jun 23, 2020Updated 5 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆84Aug 7, 2013Updated 12 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 3 months ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Proof of concept created for 'Reflection Scan: an Off-Path Attack on TCP'.☆11Jan 20, 2012Updated 14 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago