cloudsec / brootkit
Lightweight rootkit implemented by bash shell scripts v0.10
☆574Updated 7 years ago
Alternatives and similar repositories for brootkit:
Users that are interested in brootkit are comparing it to the libraries listed below
- [DEPRECATED]A novel SQL injection detection engine built on top of SQL tokenizing and syntax analysis.☆254Updated last year
- Php Codz Hacking☆657Updated 9 years ago
- F-Scrack is a single file bruteforcer supports multi-protocol☆311Updated 7 years ago
- Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerabi…☆154Updated 9 years ago
- Sample Rootkit for Linux☆397Updated 7 months ago
- Beebeeto FrameWork☆255Updated 9 years ago
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆953Updated 4 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year
- A domain/ip fuzzing tool for vulnerability mining☆99Updated 10 years ago
- It's an ezine: DO NOT FUCK WITH A HACKER☆463Updated 6 years ago
- the core papers i researched about kernel security.☆138Updated last year
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,828Updated 2 years ago
- a series tutorial for linux exploit development to newbie.☆555Updated 11 months ago
- application server attack toolkit☆685Updated 4 years ago
- complex webshell manager, quasi-http botnet.☆280Updated 10 years ago
- webshell sample for WebShell Log Analysis☆417Updated 3 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆323Updated 7 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆996Updated 3 years ago
- Fox-scan is a initiative and passive SQL Injection vulnerable Test tools.☆407Updated 8 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆650Updated 7 years ago
- Add headers to all Burp requests to bypass some WAF products☆331Updated 7 years ago
- A tool to help you write binary exploits☆608Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆489Updated 3 years ago
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- Linux Exploit Suggester; based on operating system release number☆1,783Updated 10 years ago
- Win32k LPE vulnerability used in APT attack☆287Updated 7 years ago
- a new crawler based on python with more function including Network fingerprint search☆505Updated 6 years ago
- a plenty of poc based on python☆291Updated 7 years ago
- ☆86Updated last year