azurit / modsecurity-backdoor
This is a proof-of-concept of malicious software running inside of ModSecurity WAF.
☆32Updated 3 years ago
Alternatives and similar repositories for modsecurity-backdoor:
Users that are interested in modsecurity-backdoor are comparing it to the libraries listed below
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆15Updated 2 years ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- PAM Backdoor☆27Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 11 months ago
- ☆27Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆11Updated last month
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated last year
- FireProx written in Go☆19Updated 11 months ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- ☆18Updated last year
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated this week
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated 3 weeks ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆30Updated last year
- A basic proxylogon scanner☆27Updated 3 years ago
- ☆12Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago