Skip to content
View BackdoorAli's full-sized avatar
💭
OCD at work.
💭
OCD at work.
  • 📍 At the edge of privilege escalation - In the gap between "allowed" and "possible".

Block or report BackdoorAli

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. azure-red-team-abuse-scenarios azure-red-team-abuse-scenarios Public

    Attacker-focused Azure red team abuse scenarios covering identity, RBAC, lateral movement, persistence, and OPSEC.

    1

  2. linux-less-persistence linux-less-persistence Public

    Defensive audit toolkit for detecting low-artifact persistence mechanisms on Linux systems.

    Python 1

  3. user-agent-rce user-agent-rce Public

    Educational RCE demo using User-Agent injection.

    Python 4

  4. Backdoor-Stealth-Image-Injection Backdoor-Stealth-Image-Injection Public

    Showcasing how uploaded images can be EXIF-injected with payloads to further compromise servers, in this specific case, by stealthily installing a backdoor.

    Shell 1

  5. Insider-Threat-Detection-Project Insider-Threat-Detection-Project Public

    Personal data analysis project combining insider threat detection, cybersecurity, and exploratory data analytics. Built for portfolio showcase and practical skills demonstration.

    Jupyter Notebook 1

  6. Hacking-Lists Hacking-Lists Public

    Forked from Hack-with-Github/Awesome-Hacking

    A collection of various awesome lists for hackers, pentesters and security researchers.

    1