ait-aecid / caraxesLinks
Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.
☆43Updated 6 months ago
Alternatives and similar repositories for caraxes
Users that are interested in caraxes are comparing it to the libraries listed below
Sorting:
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆629Updated last week
- Red-Team LKM☆626Updated 2 weeks ago
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- Embed a payload inside a PNG file☆361Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆290Updated 2 weeks ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆388Updated 9 months ago
- PoC for CVE-2024-48990☆106Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆418Updated 3 weeks ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆212Updated 2 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆463Updated 4 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 6 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆353Updated 4 months ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆124Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆510Updated 11 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆414Updated last week
- Proof of concept & details for CVE-2025-21298☆191Updated 11 months ago
- ☆51Updated 5 months ago
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆504Updated last month
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 9 months ago
- ☆233Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆663Updated 2 weeks ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆428Updated 11 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆495Updated 2 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- POC exploit for CVE-2024-49138☆265Updated 10 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆620Updated 8 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆786Updated 2 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆371Updated last year