droberson / icmp-backdoor
Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.
☆69Updated 5 years ago
Alternatives and similar repositories for icmp-backdoor:
Users that are interested in icmp-backdoor are comparing it to the libraries listed below
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Linux v4.x.x Rootkit☆90Updated 8 months ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆64Updated 6 years ago
- A way to backdoor every process☆65Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- ☆33Updated 9 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 6 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 8 years ago
- Windows Reverse Shell shellcode☆61Updated 2 years ago
- shell over icmp☆31Updated 11 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆73Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- ☆81Updated 11 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- A Linux RAT in C☆33Updated 6 years ago
- ☆31Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 2 months ago
- bdvl☆113Updated 3 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆74Updated 10 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆50Updated 10 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago