Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.
☆14Nov 14, 2024Updated last year
Alternatives and similar repositories for Retriever
Users that are interested in Retriever are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discord C2 for Redteam....Need a better name☆142May 7, 2023Updated 2 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Windows NTLM Authentication Backdoor☆241Jan 15, 2025Updated last year
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Make friends while searching.☆14Mar 21, 2022Updated 4 years ago
- Golang Port Knocking for Linux + Windows☆18Feb 22, 2022Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆25Apr 14, 2023Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 6 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 5 months ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- A Simple PoC☆22May 24, 2024Updated last year
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- ☆37Feb 11, 2023Updated 3 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 4 months ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Apr 22, 2024Updated last year
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- A RuneLite plugin to add progress bars in the skills tab☆11Nov 23, 2025Updated 4 months ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- My best effort at some modern sane defaults for a secure SSH client.☆11Jun 10, 2021Updated 4 years ago
- An implementation of execve() in user space☆35Oct 25, 2024Updated last year
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆135Sep 19, 2021Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago