dfir-it / supreme-backdoor-factoryLinks
This repository contains additional files mentioned in the blog post
☆22Updated 6 years ago
Alternatives and similar repositories for supreme-backdoor-factory
Users that are interested in supreme-backdoor-factory are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆20Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- ☆26Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Automated Payload Test Controller☆10Updated 7 years ago
- ☆15Updated 8 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- A Volatility command reference mind map☆14Updated 6 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 months ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago
- An Open framework to rate the exposure of ip addresses with services exposed to the internet☆30Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago