Whitecat18 / Linux-AttacksLinks
Commands and Scripts to attack Linux and Servers
☆31Updated 8 months ago
Alternatives and similar repositories for Linux-Attacks
Users that are interested in Linux-Attacks are comparing it to the libraries listed below
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 8 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 10 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Web Penetration Testing Course Materials☆32Updated last year
- ☆94Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- Windows And Ways To Break It☆100Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆20Updated 2 years ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆44Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆44Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 4 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- ☆55Updated 6 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆26Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆20Updated 5 years ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Tools and Resources for Physical Security Red Teaming☆46Updated last month
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Updated 2 years ago
- TP link AC600 Drivers for All Linux distros☆23Updated last year
- ☆62Updated 3 weeks ago
- ☆164Updated 10 months ago
- Repo for all my exploits/PoCs☆53Updated 8 months ago