Hide processes as a normal user in Linux.
☆260Jul 10, 2024Updated last year
Alternatives and similar repositories for mimic
Users that are interested in mimic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A keystroke / terminal logger for Linux.☆217Jul 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A ptrace library for easy syscall injection in Linux.☆184Jul 10, 2024Updated last year
- A tool for harvesting sysadmin credentials in Linux☆20Jul 10, 2024Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆401Nov 12, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,126Aug 2, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 9 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Jan 14, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HORSEPILL rootkit PoC☆235Aug 5, 2016Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆678Nov 21, 2017Updated 8 years ago
- Tool for extracting information from newly spawned processes☆778May 11, 2025Updated 11 months ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 9 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆78Mar 8, 2018Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆126Mar 22, 2018Updated 8 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆314Mar 25, 2021Updated 5 years ago
- kernel privilege escalation enumeration and exploitation framework☆702Aug 2, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Open-Source Shellcode & PE Packer☆2,093Feb 3, 2024Updated 2 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,306Mar 10, 2026Updated last month
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Jul 28, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Aug 22, 2016Updated 9 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Powershell VNC injector☆344Jun 29, 2020Updated 5 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Protect your parents from phishing☆41Dec 4, 2017Updated 8 years ago