emptymonkey / shelljackLinks
A keystroke / terminal logger for Linux.
☆216Updated last year
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below
Sorting:
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆177Updated 12 years ago
- Explore the network using VPNPivot tool☆271Updated 9 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆152Updated 9 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆199Updated 4 months ago
- Hide processes as a normal user in Linux.☆258Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆397Updated 5 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- XFLTReaT tunnelling framework☆329Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆220Updated 8 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆45Updated 7 years ago
- port of mimipenguin.sh in python with some additional protection features☆210Updated 8 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆214Updated 5 months ago
- unix wildcard attacks☆135Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago
- ID-spoofing NFS client☆297Updated 5 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆283Updated 7 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆110Updated 6 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆327Updated 3 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- Linux v4.x.x Rootkit☆93Updated last year
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- Check for valid credentials across a network over SMB☆268Updated last year
- A simple tool to convert the IP to a DWORD IP☆139Updated 3 years ago