dfir-it / supreme-backdoor-factory
This repository contains additional files mentioned in the blog post
☆22Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for supreme-backdoor-factory
- ☆15Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- ☆20Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 4 years ago
- ☆22Updated 3 years ago
- ☆24Updated last year
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Quantum Insert Backdoor POC☆10Updated 7 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆11Updated 9 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated 11 months ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 4 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Some of the presentations given by me☆16Updated last week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago