arget13 / DDexec
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
☆806Updated last year
Alternatives and similar repositories for DDexec:
Users that are interested in DDexec are comparing it to the libraries listed below
- Execute ELF files without dropping them on disk☆487Updated 6 months ago
- A collection of statically compiled tools like Nmap and Socat.☆433Updated 9 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,804Updated 9 months ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆940Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,351Updated 2 years ago
- Linux kernel rootkit☆307Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,230Updated 7 months ago
- ☆1,577Updated 4 months ago
- ☆2,036Updated last year
- Open-Source Shellcode & PE Packer☆1,874Updated 11 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,439Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆938Updated 2 years ago
- The swiss army knife of LSASS dumping☆1,840Updated 4 months ago
- A tool to make socks connections through HTTP agents☆684Updated 3 years ago
- A tool to kill antimalware protected processes☆1,405Updated 3 years ago
- Extract credentials from lsass remotely☆2,079Updated 2 weeks ago
- A small reverse shell for Linux & Windows☆593Updated 7 months ago
- CVE-2022-0185☆366Updated 2 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,501Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,414Updated last year
- Syscall Shellcode Loader (Work in Progress)☆1,148Updated 8 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,860Updated last month
- ☆1,861Updated last year
- Sudo Baron Samedit Exploit☆738Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks☆1,493Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,101Updated 7 months ago
- Linux PAM Backdoor☆320Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,167Updated last year
- ☆297Updated last year
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,088Updated 6 months ago