Srakai / Adun
A way to backdoor every process
☆65Updated 7 years ago
Alternatives and similar repositories for Adun:
Users that are interested in Adun are comparing it to the libraries listed below
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆112Updated 3 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 10 years ago
- ☆33Updated 9 years ago
- Python api for usage with cobalt strike's External C2 specification☆69Updated 7 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆69Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Linux v4.x.x Rootkit☆90Updated 8 months ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Updated 5 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- PE file mapping and manipulation package.☆36Updated 2 years ago
- Shellcode Of Death☆38Updated 11 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆72Updated 4 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆73Updated 6 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 6 years ago
- shell over icmp☆31Updated 11 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 6 months ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- ☆81Updated 11 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago