A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.
☆41Jun 8, 2018Updated 7 years ago
Alternatives and similar repositories for Pinkit
Users that are interested in Pinkit are comparing it to the libraries listed below
Sorting:
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated 2 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Ye olde root shell for ye olde httpd☆44Apr 3, 2015Updated 10 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 3 months ago
- Linux rootkit for kernel 4.9.133☆16Jan 6, 2019Updated 7 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Apr 15, 2019Updated 6 years ago
- 本脚本是HIDS组成的一部分,旨在对指定监控目录进行文件hash记录,定时运行,发现文件替换、修改等后门可疑程序。☆13Dec 15, 2017Updated 8 years ago
- an informative progress bar for Python 2+3 command-line tools☆12Nov 18, 2019Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Oct 22, 2019Updated 6 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 6 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- ☆23Nov 23, 2019Updated 6 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 2 months ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- ☆12May 9, 2017Updated 8 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Windows NTLMSSP library☆11Oct 13, 2020Updated 5 years ago
- Chinese mirror of Tryhackme tutorials☆16Dec 11, 2025Updated 3 months ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago