dcid / rootcheck
☆19Updated 9 years ago
Alternatives and similar repositories for rootcheck:
Users that are interested in rootcheck are comparing it to the libraries listed below
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- ☆56Updated 7 years ago
- A security scanner for Wordpress blogging engine☆32Updated 8 years ago
- Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes yo…☆173Updated 12 years ago
- WordPress Honeypot☆32Updated 7 years ago
- A Shadow Daemon connector for PHP applications☆34Updated 2 years ago
- Debian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)☆60Updated last year
- SSH Multipot☆22Updated 7 years ago
- Example Perl module for extending the cPanel API☆15Updated 13 years ago
- A fully featured malware scanner for Linux desktops and servers.☆67Updated 2 years ago
- Simple install script for Suricata/Zeek with JSON logging on FreeBSD☆18Updated last month
- Automatically exported from code.google.com/p/vulnerability-check☆9Updated 10 years ago
- Scalp!/Anathema is a log analyzer for web server (Apache, nginx) [Python3]☆46Updated 8 years ago
- A commandline vulnerability reporter using WP-CLI and WPVulnDB☆32Updated last year
- Brute Force Detection (BFD)☆24Updated 10 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 6 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- A simple and effective phpmyadmin honeypot☆65Updated 7 years ago
- Wordpress Vulnerability Scanner☆163Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆107Updated last year
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆85Updated 7 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- As per PCI Compliance. Server should not have Remote MySQL enabled. This tools proves them right☆9Updated 4 years ago
- Php Scanner for malicious files (/!\ this tool is not maintained anymore)☆35Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago