asuar078 / raisinLinks
Reverse shell and rootkit
☆19Updated 8 years ago
Alternatives and similar repositories for raisin
Users that are interested in raisin are comparing it to the libraries listed below
Sorting:
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- ☆65Updated 9 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Reverse shell for remote administration☆29Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- My Shellcode Archive☆29Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Collection of Nmap scripts☆10Updated 10 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 9 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 7 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- ☆18Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- ☆40Updated 7 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- DHCP attack tool☆21Updated last year
- A Linux RAT in C☆33Updated 7 years ago