This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.
☆22May 30, 2015Updated 10 years ago
Alternatives and similar repositories for Python-RootKit-Exploit-OSX
Users that are interested in Python-RootKit-Exploit-OSX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- Source of my blog/portfolio☆17Jun 26, 2015Updated 10 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Subscription Management Tool☆16Jul 10, 2025Updated 10 months ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- The simplest GPS tracking web-app!☆19Apr 8, 2011Updated 15 years ago
- The 3.3.5a Compatible Version of the MaNGOSVB Server, based on SpuriousEmu Emulator.☆14Feb 12, 2025Updated last year
- ☆10Apr 2, 2022Updated 4 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Aug 20, 2013Updated 12 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- CakePHP Social Media Plugin☆33Oct 25, 2013Updated 12 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A DSL for constructing json-like data sturctures☆39Feb 27, 2024Updated 2 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆14Mar 11, 2017Updated 9 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- DNS Botnet Server and Client☆33Aug 28, 2025Updated 8 months ago
- Base classes for Alien:: modules (deprecated, see Alien-Build)☆37Sep 7, 2017Updated 8 years ago
- RIG Exploit Kit (front end)☆31Feb 25, 2015Updated 11 years ago
- Learning Perl☆12Jul 2, 2012Updated 13 years ago
- MASIC generates selected ion chromatograms (SICs) for all of the parent ions chosen for fragmentation in an LC-MS/MS analysis, characteri…☆17Dec 4, 2025Updated 5 months ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Build external dependencies for use in CPAN☆17Aug 4, 2025Updated 9 months ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- A tool for embedding svg icons in Rails or stand-alone apps.☆15Nov 1, 2019Updated 6 years ago
- perl mirror☆19Dec 23, 2008Updated 17 years ago
- ZTE Open C Unbrick-, Recovery- and Root-Kit☆26Jun 10, 2014Updated 11 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- FUD Powerful Python Code Obfuscator, Crypter☆33Aug 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆18Apr 8, 2022Updated 4 years ago
- A Silent Miner that mines Crypto - XMR and ETH☆17Feb 5, 2023Updated 3 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 10 years ago
- ☆10Jul 24, 2017Updated 8 years ago