☆20Dec 14, 2021Updated 4 years ago
Alternatives and similar repositories for bashrc-backdoor
Users that are interested in bashrc-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆39Apr 4, 2022Updated 4 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆22Jul 24, 2022Updated 3 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 5 months ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- PoC Bypass Chrome Cookies App-Bound Encryption v20☆10Apr 9, 2025Updated last year
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Apr 18, 2026Updated last week
- ☆61Oct 24, 2025Updated 6 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆14May 12, 2025Updated 11 months ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 4 years ago
- ☆17Jan 2, 2026Updated 4 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Open Source XSS exploitation tool. using http proxy to access the browser which executed js. [Engineering Experimental]☆37Nov 22, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆360Apr 18, 2026Updated 2 weeks ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆139Aug 31, 2025Updated 8 months ago
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pointer analysis prototype (currently including anderson, steensgard).☆17Dec 20, 2021Updated 4 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- Yet another AIDA64 Sensor Panel☆10Aug 21, 2021Updated 4 years ago
- A MCP implementation of Frida that seeks to emulate Cheat Engine functionally to allow for seamless Game Hacking by AI agents☆55Dec 4, 2025Updated 4 months ago
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆11Jun 16, 2022Updated 3 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆92Jan 24, 2026Updated 3 months ago
- ☆27May 6, 2024Updated last year
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆46Jul 9, 2025Updated 9 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- Automatically identify and highlight targets (Russian soldiers, right-wing extremists etc) in visualized social networks☆23Sep 4, 2022Updated 3 years ago
- DN42 Automatic Peer System☆28Mar 25, 2026Updated last month
- ELK monitoring based on prometheus. Includes: elasticseatch plugin, prometheus rules, prometheus console. Just run and monitor your clust…☆12Jan 2, 2020Updated 6 years ago