Trevohack / R0DDYLinks
A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.
☆17Updated 3 weeks ago
Alternatives and similar repositories for R0DDY
Users that are interested in R0DDY are comparing it to the libraries listed below
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 7 months ago
- A C2 framework inspired by anime, made in python.☆11Updated last year
- Exploits for some linux binaries :)☆37Updated last week
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆65Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆22Updated last year
- ☆18Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
- ☆15Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 7 months ago
- execute PE in memory Filelessly☆47Updated 8 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Offensive Powershell obfuscator☆27Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆30Updated 3 years ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 11 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 10 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 5 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 2 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆94Updated 2 weeks ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago