StayPirate / t4ub
A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted partition. Useful to grab LUKS passwords.
☆23Updated 3 years ago
Alternatives and similar repositories for t4ub:
Users that are interested in t4ub are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 9 months ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Scripts for encoding files through DNS TXT records☆11Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- ☆65Updated 8 years ago