notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,558Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,446Apr 17, 2024Updated 2 years ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆851Apr 19, 2024Updated 2 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated 2 years ago
- Adversary Emulation Framework☆11,206May 7, 2026Updated 2 weeks ago
- XZ backdoor reverse engineering☆105Aug 4, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆146Apr 15, 2024Updated 2 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆60Jun 12, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,490Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,459Apr 9, 2026Updated last month
- The Havoc Framework☆8,361Dec 18, 2025Updated 5 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,960Apr 7, 2024Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,133Mar 12, 2024Updated 2 years ago
- ☆2,272Nov 24, 2023Updated 2 years ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,605May 15, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,668Oct 19, 2023Updated 2 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,322Mar 25, 2026Updated last month
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆631Jun 25, 2024Updated last year
- A fast TCP/UDP tunnel over HTTP☆16,015Apr 30, 2026Updated 3 weeks ago
- RustRedOps is a repository for advanced Red Team techniques focused on Rust☆1,874Dec 29, 2025Updated 4 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,041Jun 8, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,713Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,498May 11, 2026Updated last week
- Ghidra is a software reverse engineering (SRE) framework☆68,594May 13, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Find, verify, and analyze leaked credentials☆26,446Updated this week
- a signal handler race condition in OpenSSH's server (sshd)☆492Jul 1, 2024Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆766Feb 19, 2024Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,017Updated this week
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,978Sep 4, 2024Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆551Apr 23, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,742Updated this week
- game of active directory☆7,818Mar 12, 2026Updated 2 months ago
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,881Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆24Apr 2, 2024Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- The Network Execution Tool☆5,517May 12, 2026Updated last week
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,590Jul 8, 2025Updated 10 months ago
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,506May 10, 2026Updated last week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆695Aug 27, 2024Updated last year