Srakai / AdunLinks
A way to backdoor every process
☆68Updated 8 years ago
Alternatives and similar repositories for Adun
Users that are interested in Adun are comparing it to the libraries listed below
Sorting:
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆57Updated 4 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- ☆34Updated 9 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- ☆83Updated 11 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Shellcode Of Death☆42Updated 12 years ago
- Gozi-MBR-rootkit Bootkit Modified☆71Updated 9 years ago
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Updated 9 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 2 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆51Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 7 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 5 years ago
- ☆65Updated 9 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆54Updated 4 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago