deb0ch / toorkit
A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to replace it with a custom function.
☆12Updated 8 years ago
Alternatives and similar repositories for toorkit:
Users that are interested in toorkit are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Fuzzing Framework☆10Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated last month
- Reverse Windows shell over TLS☆18Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆16Updated 5 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- ☆12Updated 8 years ago