creaktive / tsh
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
☆568Updated last year
Alternatives and similar repositories for tsh:
Users that are interested in tsh are comparing it to the libraries listed below
- Tiny SHell is an open-source UNIX backdoor.☆681Updated 11 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆808Updated last year
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆466Updated 8 years ago
- fireELF - Fileless Linux Malware Framework☆662Updated 5 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 9 years ago
- Payload Generation Framework☆1,846Updated 7 months ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆650Updated 7 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆734Updated 8 years ago
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- Tool for extracting information from newly spawned processes☆745Updated 3 years ago
- DNS-Shell is an interactive Shell over DNS channel☆524Updated 4 years ago
- ☆81Updated 4 years ago
- Multiplatform reverse shell generator☆585Updated 5 years ago
- Pop shells like a master.☆1,453Updated 5 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆255Updated 3 years ago
- CVE-2018-8120 Windows LPE exploit☆497Updated 6 years ago
- Proofs-of-concept☆786Updated 6 months ago
- Various kernel exploits☆773Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- Simple reverse ICMP shell☆1,572Updated 6 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆328Updated 7 years ago
- TinySHell port to SCTP☆124Updated 11 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆403Updated last year
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- Dump various types of Windows credentials without injecting in any process.☆426Updated 2 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆494Updated 7 years ago
- A client compatible with Metasploit's staging protocol☆254Updated 7 years ago
- Hershell is a simple TCP reverse shell written in Go.☆531Updated 5 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆266Updated last year