lionaneesh / backdoorsLinks
A list of backdoor samples I find online.
☆13Updated 5 years ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 5 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- A nasty script which hides an HTML source code in a bunches of spaces and tabs .☆18Updated 7 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- the puppy proxy☆22Updated 5 years ago
- a Modular web penetration testing interface☆15Updated 2 years ago
- Some stuff about telecom security☆15Updated 9 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Zero-trust SSH CA☆29Updated 10 months ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Notebook collection☆10Updated 6 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Linux filesystem with a Google Docs backend, built using FUSE☆10Updated 5 years ago