Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell & reverse shell port, privilege escalation, cleans up logs and bash history during installation
☆18Feb 15, 2026Updated 2 months ago
Alternatives and similar repositories for bds_lkm
Users that are interested in bds_lkm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hide…☆37Feb 4, 2026Updated 3 months ago
- Freebsd KLD Rootkit for FreeBSD 13. Hides files, hides process, hides port, bind shell backdoor☆16Jan 15, 2026Updated 3 months ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 7 years ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆12Dec 25, 2022Updated 3 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- java版的NAT类型探测器☆16May 10, 2024Updated last year
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- AWS IAM Security Toolkit: CIS Benchmarks | Enumeration | Privilege Escalation☆15Jul 26, 2020Updated 5 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ☆23Dec 2, 2022Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- a exec jsp shell, simply like weevely php C/S shell.☆15Jun 21, 2022Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- ☆34May 9, 2024Updated last year
- 通过 Webshell 创建 BugScan 节点(需要目标支持 Python2.7)☆15Nov 9, 2016Updated 9 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Vmware source code for 2012.☆24Dec 15, 2023Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago