lionaneesh / backdoorsLinks
A list of backdoor samples I find online.
☆13Updated 5 years ago
Alternatives and similar repositories for backdoors
Users that are interested in backdoors are comparing it to the libraries listed below
Sorting:
- CLI tool for PKCS7 padding oracle attacks☆139Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- A Rust crate that simplifies the integration of Rust and eBPF programs written in C.☆20Updated 4 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Go API to interact with radare2☆33Updated last year
- scrapped ideas and garbage code☆13Updated 4 years ago
- ☆13Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 3 years ago
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- Fuzz Network Traffic☆18Updated 7 months ago
- A specialized database server for linear algebra and machine learning.☆86Updated 2 years ago
- Generate graphs with NetworkX, natively visualize with D3.js and pywebview☆71Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated last year
- 🖼 imgify - Convert any file to PNG and back.☆13Updated last year
- A tool suite for use during system assessments.☆35Updated 2 months ago
- Import and display Masscan data☆35Updated 4 months ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- ☆17Updated last year
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Frontend for MalShare.com☆17Updated this week
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago