aviat / passe-partout
Passe Partout dumps cryptographic keys from running processes. It is useful to extract private ssh keys from ssh agent.
☆27Updated 9 years ago
Alternatives and similar repositories for passe-partout:
Users that are interested in passe-partout are comparing it to the libraries listed below
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- SNIcat☆126Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆86Updated 7 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- egrets monitors egress☆45Updated 5 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 6 months ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Updated 4 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- gpocheck☆30Updated 8 months ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆59Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Container for assorted volatility plugins.☆22Updated 11 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- CLI tool to analyze PE files☆88Updated 7 months ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago