BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.
☆77Dec 13, 2022Updated 3 years ago
Alternatives and similar repositories for BackdoorMan
Users that are interested in BackdoorMan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Feb 1, 2017Updated 9 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- ☆480Nov 28, 2025Updated 5 months ago
- Evil Reflective DLL Injection Finder☆48Nov 23, 2018Updated 7 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- a program to detect reflective dll injection on a live machine☆76Dec 12, 2015Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆17Oct 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- .NET Resource Reflector☆20Mar 25, 2025Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- Map IPv4 addresses to Hilbert curves for data visualization☆23Apr 25, 2012Updated 14 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 10 months ago
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- Powershell Threat Hunting Module☆291Sep 21, 2016Updated 9 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,863Nov 17, 2021Updated 4 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆824Oct 5, 2015Updated 10 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- This Repo help you to download most helpful GO tools on the system .☆22Dec 7, 2022Updated 3 years ago
- Resolvn Threat Hunting Virtual Machine☆138Aug 16, 2019Updated 6 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 基于领英的企业用户名收集☆14Feb 3, 2020Updated 6 years ago
- Post Exploitation Wiki☆524Dec 18, 2019Updated 6 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- ☆278Apr 6, 2023Updated 3 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- OpenCATS <= 0.9.4 RCE (CVE-2021-41560)☆11Dec 10, 2021Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,748Jan 12, 2026Updated 3 months ago