creaktive / tsh
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
☆558Updated last year
Alternatives and similar repositories for tsh:
Users that are interested in tsh are comparing it to the libraries listed below
- Tiny SHell is an open-source UNIX backdoor.☆669Updated 11 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆807Updated last year
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆465Updated 8 years ago
- Payload Generation Framework☆1,832Updated 6 months ago
- Tool for extracting information from newly spawned processes☆745Updated 3 years ago
- DNS-Shell is an interactive Shell over DNS channel☆524Updated 4 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆431Updated last week
- Hide processes as a normal user in Linux.☆253Updated 7 months ago
- fireELF - Fileless Linux Malware Framework☆661Updated 5 years ago
- Simple reverse ICMP shell☆1,569Updated 6 years ago
- Payload development framework☆701Updated this week
- A python reverse shell that uses DNS as the c2 channel☆505Updated 9 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆733Updated 8 years ago
- TinySHell port to SCTP☆123Updated 11 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆708Updated 5 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,249Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆266Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 7 months ago
- Script to execute in memory a sequence of opcodes☆408Updated 10 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆252Updated 3 years ago
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆228Updated 5 years ago
- socks4 reverse proxy for penetration testing☆581Updated 6 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆167Updated 12 years ago
- Pop shells like a master.☆1,452Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- PoC for Dirty COW (CVE-2016-5195)☆493Updated 2 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,002Updated 6 years ago