PinkP4nther / Sutekh
An example rootkit that gives a userland process root permissions
☆74Updated 4 years ago
Related projects: ⓘ
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- try privilege escalation changing sudo command☆118Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Rootkit Detector for UNIX☆60Updated last year
- ☆20Updated this week
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆92Updated 3 years ago
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆75Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆68Updated 4 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- ☆64Updated 7 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆56Updated 11 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 6 years ago
- ☆31Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆84Updated 5 years ago
- ☆16Updated this week
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Updated 7 years ago
- Linux v4.x.x Rootkit☆86Updated last month
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated last year
- ☆71Updated 5 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- ☆84Updated this week
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year