An evil bit backdoor for iptables
☆55Apr 14, 2021Updated 4 years ago
Alternatives and similar repositories for iptable_evil
Users that are interested in iptable_evil are comparing it to the libraries listed below
Sorting:
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- Linux startup analyzer☆66Jun 2, 2025Updated 9 months ago
- Windows NTLM Authentication Backdoor☆241Jan 15, 2025Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Jun 27, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- ☆207Feb 24, 2022Updated 4 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- a LINUX netfilter rookit by HTTP tunnel☆24Jun 22, 2021Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- eBPF hacks☆197Dec 12, 2024Updated last year
- A task management bot for teams using Discord. Be it at school, work or anywhere else, Ivone keeps you organized.☆10Aug 28, 2021Updated 4 years ago
- ☆36May 27, 2024Updated last year
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- fork from http://icmpshell.sourceforge.net☆15Nov 26, 2015Updated 10 years ago
- Linux PAM Backdoor☆22Oct 21, 2021Updated 4 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Nov 21, 2021Updated 4 years ago
- ☆315May 16, 2022Updated 3 years ago
- An application to test windows and linux shellcodes☆94Nov 6, 2024Updated last year