PinkP4nther / SutekhLinks
An example rootkit that gives a userland process root permissions
☆78Updated 6 years ago
Alternatives and similar repositories for Sutekh
Users that are interested in Sutekh are comparing it to the libraries listed below
Sorting:
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- public exploits☆35Updated 2 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 8 years ago
- ☆65Updated 9 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 12 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Updated 7 years ago
- CVE-2018-8440 standalone exploit☆80Updated 7 years ago
- Proof of calc for CVE-2019-6453☆50Updated 2 years ago
- [Windows] Local Privilege Escalation - WebClient☆59Updated 8 years ago
- ☆96Updated 7 years ago
- Generate pentest reports based on github issues.☆16Updated 3 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- ☆40Updated 7 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- ☆73Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- ☆24Updated 7 years ago