Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities
☆15Feb 23, 2023Updated 3 years ago
Alternatives and similar repositories for Parasite
Users that are interested in Parasite are comparing it to the libraries listed below
Sorting:
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 6 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.☆22Jul 24, 2022Updated 3 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- ☆10Mar 3, 2024Updated 2 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 3 months ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- ☆23Mar 6, 2023Updated 3 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Apr 22, 2024Updated last year
- A Simple PoC☆22May 24, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 3 months ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- ☆39Mar 25, 2021Updated 4 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- An implementation of execve() in user space☆35Oct 25, 2024Updated last year
- ☆41Mar 12, 2025Updated 11 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- ☆38Dec 14, 2024Updated last year
- ☆10Aug 26, 2016Updated 9 years ago
- test application for google maps course☆11Sep 10, 2018Updated 7 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- A conlang lexicon software made in Python☆13Aug 24, 2025Updated 6 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year