amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,517Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,367Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,083Updated 10 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,594Updated 3 months ago
- Blazingly 🔥 fast 🚀 memory vulnerabilities, written in 100% safe Rust. 🦀☆4,436Updated 4 months ago
- SSHamble: Unexpected Exposures in SSH☆959Updated 3 weeks ago
- View HTTP/HTTPS requests made by any Linux program☆4,011Updated last month
- bpftop provides a dynamic real-time view of running eBPF programs. It displays the average runtime, events per second, and estimated tota…☆2,454Updated 3 weeks ago
- Navigate the CVE jungle with ease.☆2,010Updated last month
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated 11 months ago
- Detect file content types with deep learning☆8,651Updated last week
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆378Updated 11 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆975Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,855Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆790Updated 2 years ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,360Updated this week
- Analyze ELF binaries like a boss 😼🕵️♂️☆3,249Updated this week
- JA4+ is a suite of network fingerprinting standards☆1,301Updated this week
- Exploit PoC for CVE-2024-32002☆527Updated last year
- A rewrite of YARA in Rust.☆766Updated this week
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,018Updated 11 months ago
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆3,369Updated 8 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆477Updated last year
- Adversary Emulation Framework☆9,435Updated last week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆3,974Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,667Updated 7 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,401Updated 7 months ago
- An OOB interaction gathering server and client library☆3,790Updated last week
- ☆315Updated last year
- The Havoc Framework☆7,570Updated 4 months ago