azurit / modsecurity-backdoor
This is a proof-of-concept of malicious software running inside of ModSecurity WAF.
☆31Updated 2 years ago
Alternatives and similar repositories for modsecurity-backdoor:
Users that are interested in modsecurity-backdoor are comparing it to the libraries listed below
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 9 months ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆14Updated 2 years ago
- ☆27Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- VLAN ID Parser☆6Updated 8 months ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- A rogue DNS detector☆23Updated last year
- PAM Backdoor☆27Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆11Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- ☆12Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- ☆42Updated 2 years ago
- ☆12Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Kibana app for RedELK☆16Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- ☆14Updated last month
- SecurityBsides Roma Conference Repo☆10Updated last year
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆38Updated 11 months ago