Hide processes as a normal user in Linux.
☆261Jul 10, 2024Updated last year
Alternatives and similar repositories for mimic
Users that are interested in mimic are comparing it to the libraries listed below
Sorting:
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A keystroke / terminal logger for Linux.☆217Jul 10, 2024Updated last year
- A ptrace library for easy syscall injection in Linux.☆184Jul 10, 2024Updated last year
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)☆1,125Aug 2, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Jan 14, 2022Updated 4 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆675Nov 21, 2017Updated 8 years ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 10 months ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆78Mar 8, 2018Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆124Mar 22, 2018Updated 7 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆314Mar 25, 2021Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Open-Source Shellcode & PE Packer☆2,074Feb 3, 2024Updated 2 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,272Mar 10, 2026Updated last week
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Jul 28, 2021Updated 4 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Aug 22, 2016Updated 9 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago