Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆11Apr 3, 2023Updated 2 years ago
Alternatives and similar repositories for dash-shell-rootkit
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below
Sorting:
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Dec 10, 2020Updated 5 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- This is an IP Puller for the game VRChat join discord for updates and support☆18Feb 16, 2026Updated 2 weeks ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Консольное приложение для скачивания архивных материалов с сайта https://cgamos.ru☆13Nov 7, 2025Updated 3 months ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- ☆10Aug 24, 2024Updated last year
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated 3 weeks ago
- VS Code syntax support for MySQL☆12Oct 7, 2019Updated 6 years ago
- Linux /proc data in a consistent, parsed format.☆10Mar 28, 2016Updated 9 years ago
- ☆10Aug 20, 2019Updated 6 years ago
- Wifu is a wifi data analysis tool written in Python, it is based on the output of Kismet (https://www.kismetwireless.net/) files. Wifu pa…☆10Jun 11, 2015Updated 10 years ago
- Wireshark extcap interface for the WLAN Pi (www.wlanpi.com)☆11Aug 23, 2022Updated 3 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- A simple import of IIS Web Logs into a SQL Server Database so you can run fast queries against the information.☆18Jul 15, 2025Updated 7 months ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- C/C++ code obfuscator. Convert your code to a real one.☆12Sep 24, 2023Updated 2 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Fully obfuscated trojan generator for windows.☆10Jul 3, 2019Updated 6 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- ☆24Feb 19, 2026Updated last week
- PowerShell script that gathers data about logons and logoffs from Event Logs.☆12Aug 2, 2013Updated 12 years ago
- Dump Microsoft Portable Executable (PE) Files Information☆15Dec 13, 2025Updated 2 months ago
- Joulecoin☆13Sep 4, 2020Updated 5 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Feb 12, 2023Updated 3 years ago
- quickCUE creates compliant CUE files from 1001tracklists or custom track lists☆11Jul 23, 2025Updated 7 months ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Aug 13, 2022Updated 3 years ago
- Bulk email collection and retrieval, for hacker tools, mails dump☆15Apr 28, 2023Updated 2 years ago