lionaneesh / backdoorsLinks
A list of backdoor samples I find online.
☆13Updated 5 years ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Updated 4 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- A Rust crate that simplifies the integration of Rust and eBPF programs written in C.☆20Updated 4 years ago
- tamper resistant audit log☆18Updated 7 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- A specialized database server for linear algebra and machine learning.☆87Updated 2 years ago
- ☆16Updated 5 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated 2 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- General Research Repository - Only updated when I feel like it☆28Updated last year
- the puppy proxy☆22Updated 5 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 5 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Updated 8 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- ☆30Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- scrapped ideas and garbage code☆13Updated 4 years ago
- Go API to interact with radare2☆33Updated 2 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆61Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago