creaktive / tshLinks
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
☆617Updated 9 months ago
Alternatives and similar repositories for tsh
Users that are interested in tsh are comparing it to the libraries listed below
Sorting:
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆823Updated 2 years ago
- Tiny SHell is an open-source UNIX backdoor.☆706Updated 12 years ago
- Tool for extracting information from newly spawned processes☆776Updated 8 months ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆485Updated 9 years ago
- ☆737Updated 5 years ago
- Simple reverse ICMP shell☆1,612Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 3 years ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆747Updated 9 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆690Updated 8 years ago
- Script to execute in memory a sequence of opcodes☆416Updated 11 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆469Updated last year
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Updated last year
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Updated 8 years ago
- Code for my 0x00sec.org posts☆329Updated 5 years ago
- Payload Generation Framework☆1,956Updated last year
- Proofs-of-concept☆822Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Updated 6 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,270Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆679Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Updated 5 years ago
- BEURK Experimental Unix RootKit☆388Updated 8 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,505Updated 4 years ago
- Hide processes as a normal user in Linux.☆261Updated last year
- A collection of statically compiled tools like Nmap and Socat.☆479Updated last year
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆260Updated 4 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆605Updated 10 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆966Updated 8 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 10 years ago
- socks4 reverse proxy for penetration testing☆632Updated 7 years ago