Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell & reverse shell port, privilege escalation, cleans up logs and bash history during installation
☆18Feb 15, 2026Updated last month
Alternatives and similar repositories for bds_lkm
Users that are interested in bds_lkm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux userland rootkit. Hides file and directory, hides process, hides bind shell port, hides daemon port, hides reverse shell port, clea…☆20Jan 15, 2026Updated 2 months ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆29Feb 4, 2026Updated last month
- Freebsd KLD Rootkit for FreeBSD 13. Hides files, hides process, hides port, bind shell backdoor☆13Jan 15, 2026Updated 2 months ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆11Dec 25, 2022Updated 3 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- java版的NAT类型探测器☆17May 10, 2024Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago
- ☆23Dec 2, 2022Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Windows frontend for digging SSH tunnels and creating socks proxies☆12Nov 19, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- 集成6款网络空间搜索引擎(fofa、shodan、hunter、zoomeye、quake、zone(零零信安))及github聚合搜索工具。☆25Dec 8, 2023Updated 2 years ago
- improved external backtrack☆11Apr 16, 2019Updated 6 years ago
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- ☆34May 9, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago