Trevohack / R0DDYLinks
A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.
☆12Updated 7 months ago
Alternatives and similar repositories for R0DDY
Users that are interested in R0DDY are comparing it to the libraries listed below
Sorting:
- A C2 framework inspired by anime, made in python.☆11Updated 9 months ago
- Manage variables effectively when playing CTFs☆10Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 5 months ago
- A toolkit to control TTY devices☆1Updated 2 years ago
- RCE Exploit For Maltrail-v0.53☆49Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆63Updated 7 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 8 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆29Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 7 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 2 months ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Updated last year
- Red Teaming tools and techniques☆52Updated 2 years ago
- Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit☆19Updated last year
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆47Updated 2 weeks ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆96Updated 2 months ago
- Sliver CheatSheet for OSEP☆78Updated last week
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- ☆70Updated last month
- execute PE in memory Filelessly☆38Updated 4 months ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- A list of all Active Directory machines from HackTheBox☆60Updated last week
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- ☆85Updated 4 months ago
- ☆103Updated 8 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 9 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 7 months ago