This is a proof-of-concept of malicious software running inside of ModSecurity WAF.
☆34Jul 24, 2025Updated 9 months ago
Alternatives and similar repositories for modsecurity-backdoor
Users that are interested in modsecurity-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆29May 16, 2023Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 3 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- A SOCKS proxy for Citrix.☆100Dec 8, 2022Updated 3 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 3 years ago
- ☆90Jun 18, 2023Updated 2 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 10 years ago
- Telsca is an open-source tool for scraping Telegram data. Extract messages, user info, and media files, saving them in CSV or JSON format…☆12Aug 4, 2024Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- for intigriti web challenges☆16Apr 11, 2023Updated 3 years ago
- a tools for erp penetration testing☆16Dec 26, 2019Updated 6 years ago
- JavaScript component to parse, clean, remove formatting (unformat) numbers in strings.☆10Dec 5, 2024Updated last year
- Socks5 / Socks4 client and server library☆71Oct 29, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- z/OS Mainframe TPX panel account enumerator and brute forcer☆19Jan 10, 2018Updated 8 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- ☆17Jun 13, 2022Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- Python SSDeep wrapper☆14Aug 27, 2018Updated 7 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated 2 years ago
- ☆43Jan 12, 2022Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆44Feb 2, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source code of WeLeakInfo.☆10Jul 31, 2020Updated 5 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆110Oct 10, 2020Updated 5 years ago
- ☆10Jun 25, 2022Updated 3 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 4 years ago