Trevohack / R0DDYLinks
A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.
☆17Updated 2 months ago
Alternatives and similar repositories for R0DDY
Users that are interested in R0DDY are comparing it to the libraries listed below
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 9 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- ☆15Updated 2 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- execute PE in memory Filelessly☆50Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆96Updated 2 weeks ago
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- Command line client for HackTheBox☆24Updated last year
- A C2 framework inspired by anime, made in python.☆12Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Automate converting webshells into reverse shells.☆71Updated last week
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 3 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- CVE-2025-49144 PoC for security researchers to test and try.☆84Updated 5 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 weeks ago
- Exploits for some linux binaries :)☆37Updated last month
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆100Updated last month
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆110Updated last year
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Updated 5 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- CVE-2025-56383-Proof-of-Concept☆54Updated 2 months ago