droberson / icmp-backdoorLinks
Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.
☆73Updated 5 years ago
Alternatives and similar repositories for icmp-backdoor
Users that are interested in icmp-backdoor are comparing it to the libraries listed below
Sorting:
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- A way to backdoor every process☆68Updated 8 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- ☆34Updated 9 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Updated 8 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆67Updated 7 years ago
- ☆83Updated 11 years ago
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- HP printer security research code☆91Updated 8 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- Gogs CVEs☆80Updated 6 years ago
- Cisco IOS SNMP RCE PoC☆253Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 5 years ago
- A PoC for CVE-2020-0601☆338Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- A Linux RAT in C☆33Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- ☆34Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- Windows UAC Bypass☆99Updated 6 years ago