notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,558Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,441Apr 17, 2024Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆852Apr 19, 2024Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated 2 years ago
- Adversary Emulation Framework☆10,986Updated this week
- XZ backdoor reverse engineering☆103Aug 4, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆146Apr 15, 2024Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Jun 12, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,410Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Updated this week
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,953Apr 7, 2024Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,120Mar 12, 2024Updated 2 years ago
- ☆2,227Nov 24, 2023Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,662Oct 19, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,318Mar 25, 2026Updated 2 weeks ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆629Jun 25, 2024Updated last year
- A fast TCP/UDP tunnel over HTTP☆15,867Apr 4, 2026Updated last week
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,857Dec 29, 2025Updated 3 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,045Jun 8, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,799Apr 6, 2026Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,412Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆66,637Updated this week
- Find, verify, and analyze leaked credentials☆25,667Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a signal handler race condition in OpenSSH's server (sshd)☆490Jul 1, 2024Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆763Feb 19, 2024Updated 2 years ago
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,969Sep 4, 2024Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆549Apr 23, 2024Updated last year
- Differential testing framework for HTTP implementations☆928Jan 21, 2026Updated 2 months ago
- game of active directory☆7,669Mar 12, 2026Updated last month
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,842Sep 18, 2025Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆24Apr 2, 2024Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- The Network Execution Tool☆5,407Updated this week
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,535Jul 8, 2025Updated 9 months ago
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,473Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,448Feb 15, 2026Updated last month