dfir-it / supreme-backdoor-factory
This repository contains additional files mentioned in the blog post
☆22Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for supreme-backdoor-factory
- ☆15Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆20Updated 4 years ago
- SWF Vulnerability & Information Scanner☆19Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- ☆22Updated 3 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆48Updated 2 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 6 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆22Updated 7 years ago
- The official command line client for IPFinder☆11Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated 11 months ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Virtual host brute forcer☆22Updated 10 years ago