JustinTom / Packet-Sniffing-Backdoor
PoC Linux backdoor program to allow the "remote" use of terminal from client to the compromised machine.
☆6Updated 9 years ago
Alternatives and similar repositories for Packet-Sniffing-Backdoor:
Users that are interested in Packet-Sniffing-Backdoor are comparing it to the libraries listed below
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- ☆14Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- ☆24Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆10Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Remote detection of a user's AV using Flash☆14Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- collection of useful shells for penetration tests☆36Updated 8 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year