This is a proof-of-concept of malicious software running inside of ModSecurity WAF.
☆34Jul 24, 2025Updated 7 months ago
Alternatives and similar repositories for modsecurity-backdoor
Users that are interested in modsecurity-backdoor are comparing it to the libraries listed below
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- ☆90Jun 18, 2023Updated 2 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- ☆11Jun 4, 2019Updated 6 years ago
- Telsca is an open-source tool for scraping Telegram data. Extract messages, user info, and media files, saving them in CSV or JSON format…☆11Aug 4, 2024Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- a tools for erp penetration testing☆16Dec 26, 2019Updated 6 years ago
- JavaScript component to parse, clean, remove formatting (unformat) numbers in strings.☆10Dec 5, 2024Updated last year
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- Python SSDeep wrapper☆14Aug 27, 2018Updated 7 years ago
- ☆40Jan 12, 2022Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- A shell script that mimics sudo and sends you back the password☆45Feb 2, 2023Updated 3 years ago
- Source code of WeLeakInfo.☆10Jul 31, 2020Updated 5 years ago
- ☆10Jun 25, 2022Updated 3 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- ☆20Nov 5, 2025Updated 4 months ago
- ☆11Oct 21, 2020Updated 5 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 6 months ago
- ☆15Dec 16, 2021Updated 4 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- ☆23Jun 30, 2021Updated 4 years ago