emptymonkey / shelljackLinks
A keystroke / terminal logger for Linux.
☆217Updated last year
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below
Sorting:
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆469Updated last year
- Hide processes as a normal user in Linux.☆261Updated last year
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- Explore the network using VPNPivot tool☆274Updated 9 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆399Updated 6 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆154Updated 10 years ago
- XFLTReaT tunnelling framework☆329Updated 6 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆45Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆211Updated 9 months ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- port of mimipenguin.sh in python with some additional protection features☆216Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Updated 3 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆156Updated 2 years ago
- Encrypted exploit delivery for the masses☆270Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 7 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 9 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆525Updated 4 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆111Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Updated 4 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Updated 10 years ago
- BEURK Experimental Unix RootKit☆388Updated 8 years ago
- ☆147Updated 9 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆226Updated 10 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆131Updated last year
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 11 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 6 years ago