amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,527Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,396Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,280Updated 3 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,749Updated last month
- Portspoof☆2,384Updated 10 months ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,037Updated last year
- View HTTP/HTTPS requests made by any Linux program☆4,088Updated 3 months ago
- SSHamble: Unexpected Exposures in SSH☆1,149Updated last week
- The Network Execution Tool☆4,837Updated last week
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,038Updated last year
- Quickly find differences and similarities in disassembled code☆2,769Updated 2 weeks ago
- A FUSE filesystem for your Google calendar☆1,478Updated 9 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,236Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,125Updated 2 weeks ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆742Updated last year
- Gather and update all available and newest CVEs with their PoC.☆7,300Updated this week
- Hash collisions and exploitations☆3,282Updated 8 months ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,145Updated last week
- Tunnel TCP connections through a file☆965Updated this week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆981Updated last year
- Analyze ELF binaries like a boss 😼🕵️♂️☆3,445Updated last week
- Credentials Dumper for Linux using eBPF☆1,148Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Updated 3 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆485Updated 2 years ago
- Differential testing framework for HTTP implementations☆895Updated 2 weeks ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,454Updated last week
- bpftop provides a dynamic real-time view of running eBPF programs. It displays the average runtime, events per second, and estimated tota…☆2,561Updated this week
- The classic DOOM game over htop, the text-based process viewer☆482Updated last year
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,940Updated 3 weeks ago
- A tool for checking the security hardening options of the Linux kernel☆1,972Updated last week