P4ral1ax / RetrieverLinks
Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.
☆12Updated last year
Alternatives and similar repositories for Retriever
Users that are interested in Retriever are comparing it to the libraries listed below
Sorting:
- Custom SOCKS proxy for redteam☆14Updated 3 years ago
- Windows NTLM Authentication Backdoor☆16Updated 4 years ago
- LD_PRELOAD rootkit☆137Updated last year
- Command and Control that uses NTP as the transport protocol.☆26Updated 4 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Updated 4 years ago
- ☆64Updated 2 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- Attack chain emulator. Write recipes for initial access easily☆23Updated 11 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123Updated last year
- Winlogon and LSA Notification Password Filters☆19Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Updated 3 years ago
- It's pointy and it hurts!☆126Updated 3 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- A more reliable way of resolving syscall numbers in Windows☆54Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆154Updated 3 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- ☆124Updated 4 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Updated 2 months ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Updated 2 years ago
- ☆68Updated 3 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- CVE-2018-6066 using VBA☆68Updated 3 years ago
- ☆105Updated last year