attackdebris / Nix-auditor
A simple Ubuntu / Redhat / CentOS and Debian Audit Script
☆9Updated 4 years ago
Alternatives and similar repositories for Nix-auditor:
Users that are interested in Nix-auditor are comparing it to the libraries listed below
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- UAC Copy Tool☆9Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Updated 7 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- ☆10Updated 6 years ago
- ☆14Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Script created to get all the Hancitor C&C address [OLD]☆8Updated 5 years ago
- dll injection library☆9Updated 10 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Tiny research project to understand code injections on Linux based systems☆13Updated 7 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Set of useful scrpts☆10Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- Slides & Video Demos of My Talk Titled Browser Exploits? Grab ’em by the Collar! @ Brucon0x09Updated 7 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Shellcode tracer☆15Updated 8 years ago
- All tools you needed during penetration testing.☆17Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- ☆10Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago