arget13 / DDexecLinks
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
☆853Updated 3 months ago
Alternatives and similar repositories for DDexec
Users that are interested in DDexec are comparing it to the libraries listed below
Sorting:
- Execute ELF files without dropping them on disk☆494Updated last year
- Red-Team Linux kernel rootkit☆514Updated 2 months ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆988Updated 2 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆507Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,190Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,875Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,340Updated 4 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,401Updated 2 years ago
- A collection of statically compiled tools like Nmap and Socat.☆449Updated last year
- PoC for CVE-2023-4911☆388Updated last year
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,125Updated 11 months ago
- CVE-2022-0185☆371Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,451Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆616Updated 2 years ago
- Kernel exploitation technique☆577Updated last year
- A small reverse shell for Linux & Windows☆608Updated last year
- SSH based reverse shell☆1,147Updated last month
- A tool to kill antimalware protected processes☆1,454Updated 4 years ago
- Linux PAM Backdoor☆341Updated last year
- The swiss army knife of LSASS dumping☆1,964Updated 9 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,126Updated 2 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,022Updated 3 weeks ago
- Root shell PoC for CVE-2021-3156☆152Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,700Updated last year
- Credentials Dumper for Linux using eBPF☆1,144Updated 10 months ago
- Open-Source Shellcode & PE Packer☆1,981Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆798Updated last year
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆418Updated 7 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,596Updated 2 years ago