tilfin / detect-http-attack
Detecting attack tool for HTTP server such as Apache and Nginx.
☆12Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for detect-http-attack
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆18Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 6 years ago
- The official command line client for IPFinder☆11Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 6 years ago
- ☆24Updated 6 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- PoC code for crashing windows active directory☆34Updated 6 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- PCILeech HP iLO4 Service☆22Updated 5 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Format string exploit generation☆9Updated 9 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 7 years ago
- ☆17Updated 5 years ago
- A Unix rootkit☆14Updated 4 years ago
- Splits a single TCP port for a use with multiple services (in the spirit of sslh)☆35Updated 7 years ago
- LD_PRELOAD rootkit☆21Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago