lionaneesh / backdoors
A list of backdoor samples I find online.
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for backdoors
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 7 months ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- the puppy proxy☆22Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 4 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- a Modular web penetration testing interface☆13Updated last year
- Open YARA scan- and search engine☆17Updated last week
- Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engi…☆22Updated 2 months ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Data graphing library for command line.☆15Updated 3 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago