StayPirate / t4ubLinks
A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted partition. Useful to grab LUKS passwords.
☆23Updated 4 years ago
Alternatives and similar repositories for t4ub
Users that are interested in t4ub are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆49Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Rogue AP killer☆91Updated 8 years ago
- ☆15Updated 6 years ago
- Truehunter☆30Updated 4 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- apbleed☆23Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- ☆58Updated 11 years ago
- Some NSE scripts to search information from routers☆36Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- This is a source mirror for 0trace.☆12Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Simple php backdoor based on extension☆22Updated 11 years ago
- Mattermost - Shodan Slash command☆31Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 9 years ago
- Wardriving ekoparty☆15Updated 8 years ago