emptymonkey / shelljackLinks
A keystroke / terminal logger for Linux.
☆217Updated last year
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below
Sorting:
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated last year
- Hide processes as a normal user in Linux.☆258Updated last year
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- port of mimipenguin.sh in python with some additional protection features☆208Updated 8 years ago
- XFLTReaT tunnelling framework☆328Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆196Updated 2 months ago
- The ONLY hacker friendly proxy for webapp pentests.☆217Updated 8 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆153Updated 9 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆174Updated 12 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆210Updated 3 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆526Updated 4 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆283Updated 7 years ago
- Replay RDP traffic from PCAP☆194Updated 6 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆400Updated 7 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- Check for valid credentials across a network over SMB☆265Updated last year
- Local UNIX PrivEsc Aggregation☆245Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- unix wildcard attacks☆134Updated 7 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆446Updated this week
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆324Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- ☆224Updated last year