blasty / JiaTansSSHAgentLinks
☆135Updated last year
Alternatives and similar repositories for JiaTansSSHAgent
Users that are interested in JiaTansSSHAgent are comparing it to the libraries listed below
Sorting:
- eBPF hacks☆187Updated 10 months ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆133Updated 5 months ago
- ☆55Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- In-Memory Rootkit For Linux and BSD☆84Updated 2 months ago
- ☆72Updated 3 months ago
- Userland exec PoC to be used as attack vector technique☆93Updated last week
- Get root via TTY / TIOCSTI stuffing☆77Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆42Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆196Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Signing-key abuse and update exploitation framework☆129Updated 5 months ago
- io_uring based rootkit☆241Updated 6 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆121Updated 11 months ago
- ☆116Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- ☆128Updated 2 years ago
- nysm is a stealth post-exploitation container.☆261Updated 4 months ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Binary Exploitation Phrack CTF Challenge☆135Updated 2 months ago
- ☆206Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- Linpmem is a linux memory acquisition tool☆94Updated 4 months ago