Scan web server for known webshell names and responses
☆50Sep 12, 2016Updated 9 years ago
Alternatives and similar repositories for webshell-intel
Users that are interested in webshell-intel are comparing it to the libraries listed below
Sorting:
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 5 months ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- A webshell helps script kiddies to bypass disable_functions☆18May 26, 2018Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email☆11Jun 23, 2020Updated 5 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆84Aug 7, 2013Updated 12 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Proof of concept created for 'Reflection Scan: an Off-Path Attack on TCP'.☆11Jan 20, 2012Updated 14 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago