This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.
☆22May 30, 2015Updated 10 years ago
Alternatives and similar repositories for Python-RootKit-Exploit-OSX
Users that are interested in Python-RootKit-Exploit-OSX are comparing it to the libraries listed below
Sorting:
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆14Mar 11, 2017Updated 8 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 5 months ago
- Script that easily creates, signs and AV bypass .apk metasploit reverse_tcp payload.☆19Jun 14, 2020Updated 5 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Source of my blog/portfolio☆17Jun 26, 2015Updated 10 years ago
- The simplest GPS tracking web-app!☆19Apr 8, 2011Updated 14 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- Subscription Management Tool☆16Jul 10, 2025Updated 7 months ago
- create and work with /usr/local/bin/perl5.*☆20Jun 8, 2022Updated 3 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 7 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆54Nov 27, 2019Updated 6 years ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆15Apr 8, 2022Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆24Mar 2, 2018Updated 7 years ago
- Teach yourself to program with a vibrator☆12Apr 13, 2016Updated 9 years ago
- Image perceptual hashing tool☆14Apr 4, 2020Updated 5 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 3 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- Project for exploring PCA through a simple Java implementation.☆12May 28, 2013Updated 12 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago