Steal user's password when running sudo for post-exploitation purposes
☆44Sep 29, 2020Updated 5 years ago
Alternatives and similar repositories for sudo_sniff
Users that are interested in sudo_sniff are comparing it to the libraries listed below
Sorting:
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- Extract passwords from memory with strace☆41Nov 17, 2021Updated 4 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Jan 26, 2021Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.☆15Jul 11, 2017Updated 8 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆46Sep 16, 2021Updated 4 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Python Time Based Authentication Attack Tool☆21Apr 20, 2021Updated 4 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Sep 16, 2018Updated 7 years ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆29May 28, 2020Updated 5 years ago
- Remote Control With WebSocket☆25Oct 20, 2020Updated 5 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- TIBCO LABS™ Project ART☆11Aug 17, 2022Updated 3 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆53Apr 16, 2020Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A host based IDS written in C# Targetted at Metasploit☆44Nov 18, 2013Updated 12 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Jun 13, 2020Updated 5 years ago
- POC of sudo password stealer☆36Feb 10, 2021Updated 5 years ago
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- ☆15Sep 4, 2024Updated last year