Egida / kekLinks
☆77Updated last year
Alternatives and similar repositories for kek
Users that are interested in kek are comparing it to the libraries listed below
Sorting:
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆102Updated 5 years ago
- Resources About Shellcode☆212Updated 5 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- Satori botnet variant☆11Updated 3 years ago
- Poison Ivy Remote administrator tool Reload☆163Updated 5 years ago
- Experimental and sneaky backdoor patch for OpenSSH Portable.☆23Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- ☆61Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- Injects HTML/PHP/ASP to the PE☆102Updated 5 years ago
- Windows NTLM Authentication Backdoor☆241Updated 8 months ago
- bdvl☆114Updated 3 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 6 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- JScript RAT☆101Updated 4 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆84Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- ☆74Updated 4 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Updated 4 years ago
- dll proxying☆60Updated 4 years ago
- This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops☆123Updated 4 years ago
- inject or convert shellcode to PE☆41Updated 5 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆472Updated 3 years ago
- Command and Control for C# Writing☆68Updated 2 years ago
- Steal privileged token to obtain SYSTEM shell☆251Updated 5 years ago
- CVE-2022-30190 Follina POC☆105Updated 3 years ago
- Convert PE files to a shellcode☆79Updated 5 years ago