blasty / JiaTansSSHAgentLinks
☆134Updated last year
Alternatives and similar repositories for JiaTansSSHAgent
Users that are interested in JiaTansSSHAgent are comparing it to the libraries listed below
Sorting:
- eBPF hacks☆187Updated 7 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 4 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated last year
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- In-Memory Rootkit For Linux☆72Updated this week
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- ☆55Updated 9 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆210Updated last month
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- eBPF Memory Dump Tool☆82Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆241Updated this week
- ☆123Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 9 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- Linpmem is a linux memory acquisition tool☆87Updated last month
- io_uring based rootkit☆216Updated 3 months ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- ☆57Updated 3 weeks ago
- ☆95Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆66Updated 3 months ago
- Automated vulnerability discovery and annotation☆67Updated last year