cys3c / BackdoorMan
BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.
☆70Updated last year
Related projects ⓘ
Alternatives and complementary repositories for BackdoorMan
- Simulating Adversary Operations☆93Updated 6 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆145Updated 6 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆40Updated 8 years ago
- ☆43Updated 7 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆89Updated last year
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆125Updated 6 years ago
- Powershell Empire Persistence finder☆117Updated 7 years ago
- Intelligent threat hunter and phishing servers☆46Updated 5 years ago
- SMB Relay Attack Script☆148Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆113Updated 5 years ago
- A Pythonic interface and command line tool for interacting with the InQuest Labs API.☆34Updated last year
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 6 months ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆64Updated 5 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆42Updated 3 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- ☆52Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- A Report Generation Tool for Security Assessment☆63Updated 5 years ago
- Virtual scenario for Network Penetration Testing☆14Updated 7 years ago
- automate your MISP installs☆66Updated 4 years ago
- OFFICE DDEAUTO Payload Generation script☆125Updated 3 years ago
- List of default passwords for Industrial Control Systems☆69Updated 7 years ago
- Linux Incident Response☆89Updated 5 years ago