Hide processes as a normal user in Linux.
☆261Jul 10, 2024Updated last year
Alternatives and similar repositories for mimic
Users that are interested in mimic are comparing it to the libraries listed below
Sorting:
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A keystroke / terminal logger for Linux.☆217Jul 10, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A ptrace library for easy syscall injection in Linux.☆184Jul 10, 2024Updated last year
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 9 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,121Aug 2, 2019Updated 6 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆78Mar 8, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆327Jun 25, 2022Updated 3 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆123Mar 22, 2018Updated 7 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Jan 14, 2022Updated 4 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆314Mar 25, 2021Updated 4 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Payload Generation Framework☆1,964Aug 21, 2024Updated last year
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Dec 4, 2017Updated 8 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,260Jan 24, 2026Updated last month