amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,526Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,384Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,130Updated last week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated last year
- Quickly find differences and similarities in disassembled code☆2,654Updated 2 weeks ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,656Updated last month
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆985Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,117Updated 2 weeks ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,402Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,066Updated this week
- Detect file content types with deep learning☆8,731Updated this week
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,033Updated last year
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,037Updated last year
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆674Updated 11 months ago
- a signal handler race condition in OpenSSH's server (sshd)☆479Updated last year
- Hash collisions and exploitations☆3,233Updated 5 months ago
- Extract files from any kind of container formats☆2,343Updated this week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆733Updated last year
- 🚀 Caido releases, wiki and roadmap☆1,673Updated this week
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,003Updated last month
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,887Updated last year
- View HTTP/HTTPS requests made by any Linux program☆4,029Updated 3 weeks ago
- A minimal TLS 1.2 client implementation in a pure Bash script☆352Updated last year
- The Havoc Framework☆7,730Updated 3 weeks ago
- Reverse Engineering: Decompiling Binary Code with Large Language Models☆5,835Updated last month
- BlackLotus UEFI Windows Bootkit☆2,090Updated last year
- bpftop provides a dynamic real-time view of running eBPF programs. It displays the average runtime, events per second, and estimated tota…☆2,482Updated 2 months ago
- The Network Execution Tool☆4,507Updated this week
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆3,416Updated 11 months ago
- Connect like there is no firewall. Securely.☆1,718Updated last month