StayPirate / t4ub
A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted partition. Useful to grab LUKS passwords.
☆22Updated 3 years ago
Alternatives and similar repositories for t4ub:
Users that are interested in t4ub are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- ☆14Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 7 months ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆59Updated 12 years ago