azurit / modsecurity-backdoorLinks
This is a proof-of-concept of malicious software running inside of ModSecurity WAF.
☆34Updated 6 months ago
Alternatives and similar repositories for modsecurity-backdoor
Users that are interested in modsecurity-backdoor are comparing it to the libraries listed below
Sorting:
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- PAM Backdoor☆32Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Updated 2 years ago
- ☆54Updated 4 years ago
- Notification webhook for GoPhish☆57Updated last year
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- ☆27Updated 2 years ago
- Left To My Own Devices - NT hash tools☆40Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- ☆55Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- ☆59Updated 2 years ago
- LDAP Swiss Army Knife☆50Updated 2 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 9 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- wordlists for password cracking☆28Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆19Updated 4 years ago