emptymonkey / shelljack
A keystroke / terminal logger for Linux.
☆216Updated 7 months ago
Alternatives and similar repositories for shelljack:
Users that are interested in shelljack are comparing it to the libraries listed below
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 7 months ago
- Hide processes as a normal user in Linux.☆254Updated 7 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Explore the network using VPNPivot tool☆271Updated 8 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆195Updated 5 months ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆167Updated 12 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆519Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- port of mimipenguin.sh in python with some additional protection features☆208Updated 7 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆371Updated 3 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- unix wildcard attacks☆131Updated 6 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Updated 9 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆86Updated 2 months ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆151Updated 9 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆202Updated last year
- collection of verified Linux kernel exploits☆186Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆43Updated 6 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- a linux process hacker tool☆83Updated 5 years ago
- A framework for stealthy domain reconnaissance☆299Updated 3 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 6 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆283Updated 7 years ago