This is a simple process injection made in C for Linux systems
β30Sep 23, 2023Updated 2 years ago
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below
Sorting:
- γπ§γRing 3 Rootkit for Windows 10β61Dec 7, 2024Updated last year
- Wolfy AV Bypasserβ30Feb 8, 2023Updated 3 years ago
- β33Sep 10, 2025Updated 5 months ago
- Make an Linux Kernel rootkit visible again.β59Feb 27, 2025Updated last year
- A C2 framework inspired by anime, made in python.β12Feb 8, 2026Updated 3 weeks ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])β10Mar 6, 2022Updated 3 years ago
- γπ₯γCVE-2022-26134 - Confluence Pre-Auth RCEβ14Jun 19, 2022Updated 3 years ago
- A simple C program to demonstrate a Buffer Overflow.β12Jul 31, 2021Updated 4 years ago
- Misery Loader to bypass modern EDR solutionsβ15Dec 20, 2024Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.β67Jan 20, 2024Updated 2 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ25Aug 1, 2022Updated 3 years ago
- γπγTool created to extract metadata from a domainβ14Dec 7, 2024Updated last year
- β14Mar 6, 2025Updated 11 months ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.β17Sep 30, 2025Updated 5 months ago
- γπ§±γTest a list of payloads and see if you can bypass itβ62Jun 4, 2022Updated 3 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.β437Jan 5, 2025Updated last year
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β27May 23, 2023Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkitβ78Dec 16, 2024Updated last year
- CVE-2022-1040β17Sep 25, 2022Updated 3 years ago
- Open malware analysis / reversing databaseβ11Jun 14, 2021Updated 4 years ago
- γπ»γSimple kernel made in 16-bit assembly onlyβ18Dec 7, 2024Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.β116Sep 29, 2023Updated 2 years ago
- π Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project suppβ¦β18Apr 18, 2023Updated 2 years ago
- Command line client for HackTheBoxβ25Feb 26, 2024Updated 2 years ago
- Koth - TryHackMe Tricksβ189Nov 5, 2023Updated 2 years ago
- Enumeration & fingerprint toolβ23Mar 3, 2024Updated last year
- Shellcode capable of bypassing EAF / IAF mitigationsβ28Apr 11, 2023Updated 2 years ago
- Collection of codes focused on Linux rootkitsβ198Oct 22, 2025Updated 4 months ago
- A feed of malware samples curated from threat intelligence sources.β28Oct 6, 2023Updated 2 years ago
- A Repository to Track Anti-Forensic Techniquesβ118Mar 8, 2023Updated 2 years ago
- γπ½γMBR Overwrite malware for linuxβ28Dec 7, 2024Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are relaβ¦β45Jul 9, 2025Updated 7 months ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.β25Mar 18, 2021Updated 4 years ago
- A simple PDF summarizer with Node.js and groq-sdkβ11Jan 11, 2025Updated last year
- Collection Of Reverse Shell that can easily generate using Python3β59Jan 25, 2024Updated 2 years ago
- reverse socks tunneler with ntlm and proxy supportβ28Nov 24, 2019Updated 6 years ago
- γπγSimple Information finder using Google Dorkβ34Dec 20, 2020Updated 5 years ago
- A basic C2 framework written in Cβ59Jul 7, 2024Updated last year
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.β23Jul 11, 2023Updated 2 years ago