notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,559Apr 3, 2024Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,438Apr 17, 2024Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆852Apr 19, 2024Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated last year
- Adversary Emulation Framework☆10,877Updated this week
- XZ backdoor reverse engineering☆103Aug 4, 2024Updated last year
- ☆146Apr 15, 2024Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Jun 12, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,390Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,417Jan 19, 2026Updated 2 months ago
- The Havoc Framework☆8,245Dec 18, 2025Updated 3 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,949Apr 7, 2024Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,110Mar 12, 2024Updated 2 years ago
- ☆2,214Nov 24, 2023Updated 2 years ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆52,887Mar 16, 2026Updated last week
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,665Oct 19, 2023Updated 2 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,317Jul 27, 2025Updated 7 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆626Jun 25, 2024Updated last year
- A fast TCP/UDP tunnel over HTTP☆15,783Mar 9, 2026Updated 2 weeks ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,841Dec 29, 2025Updated 2 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,043Jun 8, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,492Mar 16, 2026Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,393Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆65,820Mar 16, 2026Updated last week
- Find, verify, and analyze leaked credentials☆25,121Updated this week
- a signal handler race condition in OpenSSH's server (sshd)☆491Jul 1, 2024Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆760Feb 19, 2024Updated 2 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆545Apr 23, 2024Updated last year
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,968Sep 4, 2024Updated last year
- game of active directory☆7,581Mar 12, 2026Updated last week
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,810Sep 18, 2025Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- The Network Execution Tool☆5,356Updated this week
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,501Jul 8, 2025Updated 8 months ago
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,443Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,828Nov 3, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,366Feb 15, 2026Updated last month
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆690Aug 27, 2024Updated last year