In line function hooking LKM rootkit
☆52Mar 5, 2020Updated 6 years ago
Alternatives and similar repositories for goofkit
Users that are interested in goofkit are comparing it to the libraries listed below
Sorting:
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- ☆14Nov 26, 2021Updated 4 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Process hiding library☆19Feb 23, 2020Updated 6 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- Golang Port Knocking for Linux + Windows☆18Feb 22, 2022Updated 4 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- Linux Kernel hooking engine (x86)☆389Oct 14, 2025Updated 5 months ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Practical examples and simulations developed at GNURadio☆17Feb 15, 2021Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago