creaktive / tshLinks
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
☆611Updated 4 months ago
Alternatives and similar repositories for tsh
Users that are interested in tsh are comparing it to the libraries listed below
Sorting:
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆817Updated 2 years ago
- Tiny SHell is an open-source UNIX backdoor.☆705Updated 11 years ago
- Tool for extracting information from newly spawned processes☆762Updated 3 months ago
- Code for my 0x00sec.org posts☆326Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆483Updated 8 years ago
- Simple reverse ICMP shell☆1,602Updated 7 years ago
- Script to execute in memory a sequence of opcodes☆413Updated 11 years ago
- A collection of statically compiled tools like Nmap and Socat.☆454Updated last year
- Hide processes as a normal user in Linux.☆258Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 4 years ago
- Proofs-of-concept☆808Updated last year
- TCP tunneling over HTTP/HTTPS for web application servers☆750Updated 9 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- fireELF - Fileless Linux Malware Framework☆673Updated 6 years ago
- ☆733Updated 4 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆382Updated 2 years ago
- Payload Development Framework☆792Updated this week
- A python reverse shell that uses DNS as the c2 channel☆508Updated 9 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,265Updated 2 years ago
- Payload Generation Framework☆1,905Updated last year
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆797Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆718Updated 6 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆685Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆660Updated 7 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆954Updated 7 years ago
- CVE-2020-0796 Remote Code Execution POC☆564Updated 5 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆330Updated 6 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆447Updated last month
- Various kernel exploits☆790Updated last year