amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,525Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,378Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,098Updated 11 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- Blazingly 🔥 fast 🚀 memory vulnerabilities, written in 100% safe Rust. 🦀☆4,623Updated 5 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,096Updated last week
- SSHamble: Unexpected Exposures in SSH☆968Updated 2 weeks ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,635Updated last week
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,815Updated 3 months ago
- Analyze ELF binaries like a boss 😼🕵️♂️☆3,315Updated last week
- View HTTP/HTTPS requests made by any Linux program☆4,028Updated last week
- Navigate the CVE jungle with ease.☆2,045Updated this week
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆3,388Updated 10 months ago
- The Network Execution Tool☆4,411Updated this week
- A FUSE filesystem for your Google calendar☆1,472Updated 5 months ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,030Updated last year
- A tool for checking the security hardening options of the Linux kernel☆1,914Updated this week
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆1,986Updated 2 weeks ago
- Quickly find differences and similarities in disassembled code☆2,605Updated 3 months ago
- Portspoof☆2,358Updated 6 months ago
- A rewrite of YARA in Rust.☆818Updated this week
- Tunnel TCP connections through a file☆945Updated 2 weeks ago
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated last year
- 🚀 Caido releases, wiki and roadmap☆1,651Updated 2 weeks ago
- Credentials Dumper for Linux using eBPF☆1,144Updated 10 months ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆380Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Inspect a command's effects before modifying your live system☆5,290Updated 3 weeks ago
- Static analysis for GitHub Actions☆2,777Updated this week
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,202Updated last week
- Compile shell scripts to static binaries.☆2,443Updated last month