droberson / icmp-backdoor
Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.
☆67Updated 4 years ago
Alternatives and similar repositories for icmp-backdoor:
Users that are interested in icmp-backdoor are comparing it to the libraries listed below
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- Linux v4.x.x Rootkit☆87Updated 5 months ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- A Linux RAT in C☆32Updated 6 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆109Updated 3 years ago
- A way to backdoor every process☆65Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆76Updated 7 years ago
- A tiny framework for easily manipulate the tty and create fake binaries.☆154Updated 4 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆180Updated 7 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆83Updated last year
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆51Updated 10 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 8 years ago
- Windows Reverse Shell shellcode☆61Updated 2 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆56Updated 4 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- public exploits☆35Updated last year
- ☆32Updated 8 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆77Updated last year
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆40Updated 7 years ago
- ☆72Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- shell over icmp☆31Updated 11 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago