emptymonkey / shelljack
A keystroke / terminal logger for Linux.
☆212Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for shelljack
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆458Updated 4 months ago
- HORSEPILL rootkit PoC☆222Updated 8 years ago
- Hide processes as a normal user in Linux.☆255Updated 4 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆311Updated 6 years ago
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 4 years ago
- XFLTReaT tunnelling framework☆326Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆288Updated 3 months ago
- The ONLY hacker friendly proxy for webapp pentests.☆213Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆128Updated 3 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆397Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆159Updated 11 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆190Updated last month
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆314Updated 2 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆772Updated 8 months ago
- Automated Linux evil maid attack☆419Updated 8 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆513Updated 3 years ago
- Decept Network Protocol Proxy☆276Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆141Updated last year
- A shellcode writing toolkit☆659Updated 2 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆117Updated 4 years ago
- Simple reverse ICMP shell☆134Updated 10 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆206Updated 8 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated last year
- a linux process hacker tool☆83Updated 5 years ago