☆20Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for webshellDc
Users that are interested in webshellDc are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- Java安全研究与安全开发面试题库,同是也是常见知识点的梳理和总结,包含问题和详细的答案,计划定期更新☆16Apr 30, 2022Updated 3 years ago
- 基于深度学习与集成学习的综合策略WebShell检测系统☆19Dec 26, 2018Updated 7 years ago
- dga classification with fasttext☆13Oct 29, 2018Updated 7 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 4 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- Public disclosure channel for security vulnerabilities☆18Nov 17, 2025Updated 4 months ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Aug 27, 2018Updated 7 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- 识别操作系统指纹☆20Jan 17, 2022Updated 4 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Archive of DJI dji_system.bin firmware files, that are in active GPL violation☆19Jul 16, 2017Updated 8 years ago
- Windows提权辅助工具☆24Aug 2, 2020Updated 5 years ago
- ☆27May 14, 2022Updated 3 years ago
- Share your Yara rules with VirusTotal☆28Aug 12, 2024Updated last year
- CVE-2020-13277 靶场: Gitlab 逻辑漏洞 - 任意用户越权访问私有仓库☆27Jan 24, 2023Updated 3 years ago
- ☆28Dec 2, 2021Updated 4 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 4 years ago
- Fork of https://code.google.com/p/lorcon/☆12Sep 23, 2013Updated 12 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆24Nov 1, 2020Updated 5 years ago
- idax: IDASDK extension libraries☆23Oct 12, 2025Updated 5 months ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 5 years ago
- 《JNDI-深入理解Java万恶之源》☆39Nov 13, 2023Updated 2 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 4 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆113Sep 25, 2018Updated 7 years ago
- PendingIntent exploit☆11Sep 26, 2023Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Aug 31, 2021Updated 4 years ago
- 使用python2.7、PYQT5实现的网络嗅探器☆16Nov 7, 2017Updated 8 years ago
- 蓝牙安全检测项目☆10Jan 31, 2023Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- Exploring internet domain names with deep learning using vector embeddings☆20Dec 14, 2018Updated 7 years ago
- Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.☆25Jan 19, 2022Updated 4 years ago
- ☆83Nov 20, 2021Updated 4 years ago