azurit / modsecurity-backdoorLinks
This is a proof-of-concept of malicious software running inside of ModSecurity WAF.
☆34Updated 4 months ago
Alternatives and similar repositories for modsecurity-backdoor
Users that are interested in modsecurity-backdoor are comparing it to the libraries listed below
Sorting:
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Updated 2 years ago
- PAM Backdoor☆33Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- ☆54Updated 4 years ago
- Ingest openldap data into bloodhound☆82Updated 4 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 7 months ago
- Red Team Server (RTS)☆16Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 2 months ago
- ☆55Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last week
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 3 weeks ago
- ☆18Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago