Trevohack / R0DDYLinks
A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.
☆12Updated 3 weeks ago
Alternatives and similar repositories for R0DDY
Users that are interested in R0DDY are comparing it to the libraries listed below
Sorting:
- A C2 framework inspired by anime, made in python.☆11Updated 11 months ago
- Manage variables effectively when playing CTFs☆10Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆53Updated 6 months ago
- RCE Exploit For Maltrail-v0.53☆49Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated 11 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆83Updated 2 weeks ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 10 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated 9 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆13Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- ☆44Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 3 months ago
- PowerShell Obfuscator☆179Updated last year
- Reverse shell that can bypass windows defender detection☆166Updated last year
- A toolkit to control TTY devices☆1Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆57Updated 2 years ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆65Updated 9 months ago
- Red Teaming tools and techniques☆53Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆65Updated last year
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆57Updated last year
- ☆20Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated 2 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago