BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.
☆77Dec 13, 2022Updated 3 years ago
Alternatives and similar repositories for BackdoorMan
Users that are interested in BackdoorMan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Feb 1, 2017Updated 9 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Evil Reflective DLL Injection Finder☆47Nov 23, 2018Updated 7 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆18Oct 8, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,859Nov 17, 2021Updated 4 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Fast IOC and YARA Scanner☆90Mar 23, 2020Updated 6 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Resolvn Threat Hunting Virtual Machine☆139Aug 16, 2019Updated 6 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year
- Kali linux virtual machine termux☆12Jun 18, 2021Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,733Jan 12, 2026Updated 2 months ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago