bl0w / bl0wsshd00r67p1View external linksLinks
OpenSSH 6.7p1 backdoor kit
☆21Oct 23, 2014Updated 11 years ago
Alternatives and similar repositories for bl0wsshd00r67p1
Users that are interested in bl0wsshd00r67p1 are comparing it to the libraries listed below
Sorting:
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- 本脚本是HIDS组成的一部分,旨在对指定监控目录进行文件hash记录,定时运行,发现文件替换、修改等后门可疑程序。☆13Dec 15, 2017Updated 8 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- The Python interface for YARA http://virustotal.github.io/yara/☆21Jul 13, 2017Updated 8 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- ☆27Dec 20, 2018Updated 7 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- a small tool for auditting weak ssh password☆23Feb 24, 2018Updated 7 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Converts crontab expressions to human-readable descriptions☆25Sep 17, 2018Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- ☆26May 7, 2016Updated 9 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Jul 28, 2016Updated 9 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- tundeep☆42Aug 2, 2019Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。☆45Sep 9, 2020Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆98Feb 21, 2019Updated 6 years ago