An example rootkit that gives a userland process root permissions
☆78Oct 17, 2019Updated 6 years ago
Alternatives and similar repositories for Sutekh
Users that are interested in Sutekh are comparing it to the libraries listed below
Sorting:
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- HTML5 WebSocket message fuzzer☆148Nov 23, 2018Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Linux v4.x.x Rootkit☆92Jul 27, 2024Updated last year
- ☆16Aug 2, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- 甲方安全工程师必备,内部钓鱼系统☆230Jan 15, 2022Updated 4 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆198Aug 29, 2015Updated 10 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Apr 6, 2016Updated 9 years ago