lionaneesh / backdoorsLinks
A list of backdoor samples I find online.
☆13Updated 5 years ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆140Updated 4 years ago
- A Rust crate that simplifies the integration of Rust and eBPF programs written in C.☆20Updated 4 years ago
- ☆13Updated 5 years ago
- egrets monitors egress☆46Updated 5 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Network Traffic Fuzzer☆18Updated 9 months ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 5 years ago
- scrapped ideas and garbage code☆13Updated 4 years ago
- A tool suite for use during system assessments.☆35Updated 4 months ago
- Generate graphs with NetworkX, natively visualize with D3.js and pywebview☆71Updated 4 years ago
- Historical Tracking of MAC Address Assignments☆35Updated this week
- tamper resistant audit log☆18Updated 7 years ago
- a Modular web penetration testing interface☆15Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- the puppy proxy☆22Updated 5 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆53Updated last month
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Go API to interact with radare2☆33Updated last year
- Upload external IP so you can find your devices elsewhere☆15Updated last year