blasty / JiaTansSSHAgent
☆130Updated 9 months ago
Alternatives and similar repositories for JiaTansSSHAgent:
Users that are interested in JiaTansSSHAgent are comparing it to the libraries listed below
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆83Updated 2 months ago
- ☆85Updated last week
- eBPF hacks☆180Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆195Updated last month
- ☆55Updated 3 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated 9 months ago
- In-Memory Rootkit For Linux☆72Updated 2 months ago
- CVE-2023-4911 proof of concept☆166Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆135Updated 4 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated 8 months ago
- Web interface to explore Suricata EVE outputs☆48Updated last month
- Open Source eBPF Malware Analysis Framework☆46Updated 2 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆40Updated 7 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆240Updated 11 months ago
- WallEscape vulnerability in util-linux☆49Updated 9 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated 8 months ago
- Get root via TTY / TIOCSTI stuffing☆66Updated 6 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆110Updated this week
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆228Updated last week
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆45Updated 2 weeks ago
- ☆77Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆221Updated last week
- A tool for firmware cartography☆142Updated 3 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆98Updated 2 months ago
- nysm is a stealth post-exploitation container.☆241Updated last year
- ☆201Updated 2 months ago
- Linpmem is a linux memory acquisition tool☆75Updated 8 months ago
- ☆123Updated last year