amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,531Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,391Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,244Updated last month
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,721Updated this week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,182Updated this week
- SSHamble: Unexpected Exposures in SSH☆1,141Updated last week
- Blazingly 🔥 fast 🚀 memory vulnerabilities, written in 100% safe Rust. 🦀☆4,796Updated 7 months ago
- Quickly find differences and similarities in disassembled code☆2,714Updated last week
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,421Updated last week
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,043Updated last year
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆3,431Updated last year
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆983Updated last year
- A tool for checking the security hardening options of the Linux kernel☆1,950Updated this week
- View HTTP/HTTPS requests made by any Linux program☆4,074Updated 2 months ago
- bpftop provides a dynamic real-time view of running eBPF programs. It displays the average runtime, events per second, and estimated tota…☆2,529Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,094Updated last week
- Analyze ELF binaries like a boss 😼🕵️♂️☆3,401Updated last week
- Portspoof☆2,376Updated 8 months ago
- a signal handler race condition in OpenSSH's server (sshd)☆483Updated last year
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,037Updated last year
- Fast and accurate AI powered file content types detection☆8,814Updated this week
- Public open-source code of malware Stuxnet (aka MyRTUs).☆1,123Updated 3 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,148Updated last year
- Gather and update all available and newest CVEs with their PoC.☆7,215Updated this week
- secator - the pentester's swiss knife☆1,141Updated last week
- The Network Execution Tool☆4,671Updated this week
- Extract files from any kind of container formats☆2,355Updated this week
- Provides automated reverse engineering assistance through the use of local large language models (LLMs) on consumer hardware.☆979Updated last year
- Automated decoding of encrypted text without knowing the key or ciphers used☆775Updated last week