creaktive / tshLinks
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
☆578Updated 2 months ago
Alternatives and similar repositories for tsh
Users that are interested in tsh are comparing it to the libraries listed below
Sorting:
- Tiny SHell is an open-source UNIX backdoor.☆693Updated 11 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆812Updated 2 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆469Updated 8 years ago
- Code for my 0x00sec.org posts☆324Updated 4 years ago
- Tool for extracting information from newly spawned processes☆761Updated 2 months ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 9 years ago
- Hide processes as a normal user in Linux.☆258Updated last year
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆659Updated 7 years ago
- Script to execute in memory a sequence of opcodes☆411Updated 11 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆792Updated last year
- Simple reverse ICMP shell☆1,599Updated 7 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆805Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆957Updated 4 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆744Updated 8 years ago
- Sample Rootkit for Linux☆399Updated 11 months ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,260Updated 2 years ago
- Dump various types of Windows credentials without injecting in any process.☆427Updated 2 years ago
- ☆728Updated 4 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆446Updated this week
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- A WebSocket C2 Tool☆400Updated 7 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆715Updated 6 years ago
- A collection of statically compiled tools like Nmap and Socat.☆449Updated last year
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Simple linux backdoors and hiding techniques☆212Updated 7 years ago