emptymonkey / shelljack
A keystroke / terminal logger for Linux.
☆216Updated 10 months ago
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below
Sorting:
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆463Updated 10 months ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Hide processes as a normal user in Linux.☆257Updated 10 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- XFLTReaT tunnelling framework☆328Updated 5 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆521Updated 3 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆152Updated 9 years ago
- Check for valid credentials across a network over SMB☆262Updated last year
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆171Updated 12 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆205Updated last month
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆375Updated 3 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 6 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated last week
- A tool to detect and crash Cuckoo Sandbox☆293Updated 9 months ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆282Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- simple shellcode generator☆113Updated 8 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆44Updated 7 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆210Updated 9 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆406Updated 2 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago