0xfffffffa / apache-rootkitLinks
A malicious Apache module with rootkit functionality
☆0Updated 10 years ago
Alternatives and similar repositories for apache-rootkit
Users that are interested in apache-rootkit are comparing it to the libraries listed below
Sorting:
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- POC for Cobalt Strike external C2☆135Updated 3 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆74Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆128Updated 10 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 4 months ago
- Python api for usage with cobalt strike's External C2 specification☆238Updated 2 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 9 months ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆175Updated 4 years ago
- Poc for CVE-2019-1253☆156Updated 3 years ago
- Shellcoding utilities☆222Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 4 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 3 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 10 years ago
- sploit☆68Updated 5 years ago
- with metasploit☆63Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Various Aggressor Scripts I've Created.☆149Updated 3 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- Linux v4.x.x Rootkit☆90Updated 10 months ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- ReVBShell - Reverse VBS Shell☆83Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 3 months ago
- Proof-of-concept code for various bugs☆110Updated 7 months ago