Srakai / AdunLinks
A way to backdoor every process
☆66Updated 7 years ago
Alternatives and similar repositories for Adun
Users that are interested in Adun are comparing it to the libraries listed below
Sorting:
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆112Updated 4 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Shellcode Of Death☆39Updated 11 years ago
- ☆33Updated 9 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆24Updated 6 years ago
- ☆81Updated 11 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Various Crypter Project☆52Updated 11 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 11 months ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆51Updated 3 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆23Updated 7 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- A Simple PE File Heuristics Scanners☆51Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 9 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago