attackgithub / bdvlLinks
LD_PRELOAD Linux rootkit (x86 & ARM)
☆23Updated 6 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- A Linux RAT in C☆33Updated 6 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- ☆10Updated 6 years ago
- Research project for understanding how Mimikatz work and become better at C☆122Updated 3 years ago
- ownCloud exploits for CVE-2023-49105☆37Updated last year
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x and 6.x on x86_64, hides files, hides process, hides bind shell & reverse shell…☆10Updated last year
- not an exploit or a poc☆17Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆80Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆52Updated 4 months ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- ☆12Updated last year