A keystroke / terminal logger for Linux.
☆217Jul 10, 2024Updated last year
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below
Sorting:
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- A collection of scripts which may come in handy during your freedom fighting activities.☆411May 8, 2023Updated 2 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- A ptrace library for easy syscall injection in Linux.☆184Jul 10, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Remote administration service which uses twitter as a command and control server☆721Feb 25, 2021Updated 5 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A handy collection of my public exploits, all in one place.☆672Jan 6, 2026Updated last month
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- socks4 reverse proxy for penetration testing☆638Jul 12, 2018Updated 7 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- Credentials catching honeypot☆390May 21, 2024Updated last year
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆790Sep 30, 2020Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Linux Application Firewall☆58May 23, 2020Updated 5 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- ☆12Oct 12, 2013Updated 12 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Freedom Fighting Mode: open source hacking harness☆346Mar 21, 2024Updated last year
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago