f0rb1dd3n / Reptile
LKM Linux rootkit
☆2,656Updated 3 years ago
Alternatives and similar repositories for Reptile:
Users that are interested in Reptile are comparing it to the libraries listed below
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆1,921Updated last year
- awesome-linux-rootkits☆1,780Updated last month
- Privilege Escalation Project - Windows / Linux / Mac☆2,483Updated 4 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,029Updated last year
- Linux privilege escalation auditing tool☆5,799Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,786Updated last year
- Windows Exploit Suggester - Next Generation☆4,325Updated last week
- MS17-010☆2,169Updated last year
- Monitor linux processes without root permissions☆5,111Updated 2 years ago
- Simple reverse ICMP shell☆1,569Updated 6 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,341Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,881Updated 2 years ago
- ✍️ A curated list of CVE PoCs.☆3,370Updated 3 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,362Updated 4 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,381Updated last month
- windows-kernel-exploits Windows平台提权漏洞集合☆8,202Updated 3 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆794Updated 10 months ago
- Mimikatz implementation in pure Python☆2,953Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,222Updated 10 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,546Updated 5 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,845Updated 4 years ago
- Linux Exploit Suggester; based on operating system release number☆1,779Updated 10 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,199Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,499Updated 3 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,049Updated 4 years ago
- The ultimate WinRM shell for hacking/pentesting☆4,722Updated 2 months ago
- A swiss army knife for pentesting networks☆8,587Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,157Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,600Updated 4 years ago
- UAC bypass, Elevate, Persistence methods☆2,656Updated 2 years ago