bressan3 / System-Backdoor
A backdoor socket that takes commands from a client and executes them in the server machine
☆9Updated 7 years ago
Related projects: ⓘ
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆17Updated 6 months ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆18Updated 10 years ago
- LD_PRELOAD rootkit☆21Updated 9 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- ☆28Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 6 years ago
- Win32 Shellcodes☆9Updated 6 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 9 years ago
- Format string exploit generation☆9Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- ☆12Updated this week
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- FUD Metasploit Android Payload☆10Updated 8 years ago
- A Unix rootkit☆13Updated 4 years ago
- ☆12Updated this week
- ☆22Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- ☆17Updated this week
- ☆11Updated 6 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆20Updated 9 years ago