cloudsec / brootkitLinks
Lightweight rootkit implemented by bash shell scripts v0.10
☆574Updated 7 years ago
Alternatives and similar repositories for brootkit
Users that are interested in brootkit are comparing it to the libraries listed below
Sorting:
- [DEPRECATED]A novel SQL injection detection engine built on top of SQL tokenizing and syntax analysis.☆253Updated last year
- Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerabi…☆155Updated 9 years ago
- Beebeeto FrameWork☆255Updated 9 years ago
- Php Codz Hacking☆658Updated 9 years ago
- Sample Rootkit for Linux☆399Updated 11 months ago
- unified io lib for pwning development written in python☆397Updated last month
- It's an ezine: DO NOT FUCK WITH A HACKER☆464Updated 6 years ago
- LibZeroEvil & the Research Rootkit project.☆593Updated 3 years ago
- F-Scrack is a single file bruteforcer supports multi-protocol☆310Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆791Updated last year
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆327Updated 8 years ago
- online pcap forensic☆480Updated 7 years ago
- A python tool to identify different Hash Function Algorithms☆409Updated 4 years ago
- Script to execute in memory a sequence of opcodes☆411Updated 11 years ago
- webshell sample for WebShell Log Analysis☆417Updated 3 years ago
- High-interaction MitM SSH honeypot☆169Updated 7 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 9 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆957Updated 4 years ago
- aspcode堆溢出利用代码☆49Updated 10 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆442Updated 4 years ago
- A domain/ip fuzzing tool for vulnerability mining☆99Updated 10 years ago
- ☆339Updated 8 years ago
- a plenty of poc based on python☆290Updated 8 years ago
- Win32k LPE vulnerability used in APT attack☆288Updated 7 years ago
- complex webshell manager, quasi-http botnet.☆281Updated 10 years ago
- Reverse TCP Port to UDP Forwarding Tools☆158Updated 8 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 3 years ago
- Security CTF Toolkit (Not maintained anymore)☆372Updated 7 years ago
- Wireless Auditing, Intrusion Detection & Prevention System☆513Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆496Updated 7 years ago