amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,531Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,415Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆846Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,288Updated 3 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,256Updated last week
- SSHamble: Unexpected Exposures in SSH☆1,157Updated 2 weeks ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,476Updated this week
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,762Updated 2 months ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,037Updated last year
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆983Updated last year
- Quickly find differences and similarities in disassembled code☆2,794Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,180Updated this week
- Analyze ELF binaries like a boss 😼🕵️♂️☆3,610Updated this week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆798Updated 3 years ago
- View HTTP/HTTPS requests made by any Linux program☆4,116Updated 4 months ago
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,962Updated last month
- A minimal TLS 1.2 client implementation in a pure Bash script☆352Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,150Updated last year
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,972Updated 2 months ago
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,876Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆487Updated last year
- Portable Executable reversing tool with a friendly GUI☆3,351Updated 2 weeks ago
- JA4+ is a suite of network fingerprinting standards☆1,608Updated this week
- CVE cache of the official CVE List in CVE JSON 5 format☆2,326Updated this week
- ☆523Updated last year
- Blazingly 🔥 fast 🚀 memory vulnerabilities, written in 100% safe Rust. 🦀☆5,141Updated last month
- Tunnel TCP connections through a file☆971Updated this week
- A FUSE filesystem for your Google calendar☆1,481Updated 9 months ago
- The Havoc Framework☆7,951Updated 4 months ago
- Fast and accurate AI powered file content types detection☆9,741Updated this week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆871Updated 7 months ago