Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.
☆14Nov 14, 2024Updated last year
Alternatives and similar repositories for Retriever
Users that are interested in Retriever are comparing it to the libraries listed below
Sorting:
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 5 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Make friends while searching.☆14Mar 21, 2022Updated 3 years ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Golang Port Knocking for Linux + Windows☆18Feb 22, 2022Updated 4 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Windows NTLM Authentication Backdoor☆241Jan 15, 2025Updated last year
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Apr 22, 2024Updated last year
- A Simple PoC☆22May 24, 2024Updated last year
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆25Apr 14, 2023Updated 2 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 3 months ago
- ☆37Feb 11, 2023Updated 3 years ago
- An implementation of execve() in user space☆35Oct 25, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- black Ip lists, dorks-collection☆16Updated this week
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- NAT Slipstream attack code samples☆48Jun 28, 2021Updated 4 years ago