Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.
☆19Mar 2, 2020Updated 6 years ago
Alternatives and similar repositories for Freebsd-Rootkit
Users that are interested in Freebsd-Rootkit are comparing it to the libraries listed below
Sorting:
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609☆89Oct 22, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 10 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- A Simple Backdoor For Apache HTTP Server☆156Aug 28, 2024Updated last year
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 7 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- ☆13Feb 8, 2019Updated 7 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A FreeBSD Kernel Rootkit written in C and Golang☆14Mar 28, 2019Updated 6 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 7 years ago
- ecshop rce getshell☆31Dec 5, 2018Updated 7 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- ☆36Feb 17, 2020Updated 6 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- ☆18Mar 28, 2015Updated 10 years ago
- lz77win sources!lz77 is the compression software for the windows platform.☆24Apr 16, 2019Updated 6 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- ld_preload userland rootkit☆35Dec 13, 2020Updated 5 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- server2012-Group-policy-RCE☆46Oct 29, 2019Updated 6 years ago
- mssql 终端连接工 具|命令执行☆40Sep 29, 2019Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago