BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.
☆77Dec 13, 2022Updated 3 years ago
Alternatives and similar repositories for BackdoorMan
Users that are interested in BackdoorMan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Feb 1, 2017Updated 9 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Evil Reflective DLL Injection Finder☆48Nov 23, 2018Updated 7 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 8 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 6 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- a program to detect reflective dll injection on a live machine☆76Dec 12, 2015Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- "Evolving AppCompat/AmCache data analysis beyond grep"☆211Sep 15, 2021Updated 4 years ago
- Go reverse shell for Win/Linux/OSX☆17May 15, 2019Updated 7 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆17Oct 8, 2021Updated 4 years ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- Map IPv4 addresses to Hilbert curves for data visualization☆23Apr 25, 2012Updated 14 years ago
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Powershell Threat Hunting Module☆291Sep 21, 2016Updated 9 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,867Nov 17, 2021Updated 4 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Dec 22, 2022Updated 3 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Post Exploitation Wiki☆525Dec 18, 2019Updated 6 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- ☆279Apr 6, 2023Updated 3 years ago
- Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execut…☆21May 15, 2021Updated 5 years ago