P4ral1ax / RetrieverLinks
Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.
☆12Updated last year
Alternatives and similar repositories for Retriever
Users that are interested in Retriever are comparing it to the libraries listed below
Sorting:
- Custom SOCKS proxy for redteam☆13Updated 3 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Updated 4 years ago
- ☆64Updated last year
- LD_PRELOAD rootkit☆137Updated last year
- It's what all the kids are talking about☆12Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆26Updated 4 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Updated 3 years ago
- ☆105Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆25Updated 2 months ago
- Windows NTLM Authentication Backdoor☆16Updated 4 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆119Updated last year
- runs sliver command on all hosts, partially based on example in sliver repo☆13Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123Updated last year
- Bitpixie exploitation PoC☆92Updated 3 months ago
- ☆68Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Updated 11 months ago
- ☆102Updated last year
- Winlogon and LSA Notification Password Filters☆19Updated 2 years ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆74Updated 2 months ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- ☆133Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Updated 2 years ago
- Repo of RIT CCDC Team Scripts☆14Updated 3 years ago
- Linux Sleep Obfuscation☆107Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Updated last year