embedi / tcl_shellcodeLinks
A template project for creating a shellcode for the Cisco IOS in the C language
☆34Updated 7 years ago
Alternatives and similar repositories for tcl_shellcode
Users that are interested in tcl_shellcode are comparing it to the libraries listed below
Sorting:
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 7 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆39Updated 10 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆77Updated 3 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- ☆24Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆67Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Cisco IOS Exploit Framework☆21Updated 5 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- ☆15Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆18Updated 8 months ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- ☆11Updated 8 years ago