amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,522Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆845Updated last year
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,374Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- Quickly find differences and similarities in disassembled code☆2,591Updated 2 months ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,028Updated last year
- Extract files from any kind of container formats☆2,324Updated this week
- 🚀 Caido releases, wiki and roadmap☆1,629Updated this week
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆3,376Updated 9 months ago
- Navigate the CVE jungle with ease.☆2,029Updated last week
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆8,808Updated this week
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,867Updated last year
- A rewrite of YARA in Rust.☆802Updated last week
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆479Updated last year
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,378Updated last week
- Reverse Engineering: Decompiling Binary Code with Large Language Models☆5,710Updated this week
- The Network Execution Tool☆4,337Updated this week
- View HTTP/HTTPS requests made by any Linux program☆4,022Updated 2 months ago
- Differential testing framework for HTTP implementations☆833Updated last month
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,612Updated this week
- SSH-MITM - ssh audits made simple☆1,389Updated 2 weeks ago
- A tool for checking the security hardening options of the Linux kernel☆1,903Updated last week
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,010Updated last year
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆1,969Updated last week
- Official radare2 GUI☆1,305Updated last week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,066Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,773Updated 7 months ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,662Updated 8 months ago
- Tunnel TCP connections through a file☆939Updated 2 weeks ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,495Updated last year
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆574Updated this week