A simple script to automate systemd backdoor
☆39Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for systemd-backdoor
Users that are interested in systemd-backdoor are comparing it to the libraries listed below
Sorting:
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- Koth - TryHackMe Tricks☆189Nov 5, 2023Updated 2 years ago
- My first dotfiles ever. Made for wayfire☆11Nov 5, 2022Updated 3 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Apr 18, 2023Updated 2 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- ☆32Feb 13, 2026Updated 2 weeks ago
- ☆19Jan 11, 2025Updated last year
- a simple assembly bootloader using nasm and Intel syntax☆10Mar 12, 2022Updated 3 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- MSBuild AL bypass☆18Mar 9, 2023Updated 2 years ago
- ☆44Dec 11, 2022Updated 3 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆61Dec 7, 2024Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Dec 7, 2024Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆116Sep 29, 2023Updated 2 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆369Aug 29, 2025Updated 6 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆437Jan 5, 2025Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 7 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- ☆11Updated this week
- Starter template for vue 3 applications with theme switching, registration, authentication, email verification, and the best 404 Not Foun…☆11Jan 28, 2022Updated 4 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Automate installation of extra pentest tools on Kali Linux☆41Jan 4, 2021Updated 5 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- Gotham font family files☆14Jan 19, 2021Updated 5 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago