f0rb1dd3n / Reptile
LKM Linux rootkit
☆2,612Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Reptile
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆1,843Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,312Updated last year
- Linux privilege escalation auditing tool☆5,660Updated 9 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆3,971Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,449Updated last month
- MS17-010☆2,146Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,736Updated 9 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,008Updated last year
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆786Updated 7 months ago
- awesome-linux-rootkits☆1,723Updated last year
- ✍️ A curated list of CVE PoCs.☆3,324Updated 2 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,771Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,779Updated 10 years ago
- Windows Exploit Suggester - Next Generation☆4,230Updated this week
- A tool to dump the login password from the current linux user☆3,818Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,472Updated last month
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week
- Empire is a PowerShell and Python post-exploitation agent.☆7,461Updated 4 years ago
- Monitor linux processes without root permissions☆4,961Updated last year
- linux-kernel-exploits Linux平台提权漏洞集合☆5,292Updated 4 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,858Updated last year
- Simple reverse ICMP shell☆1,561Updated 6 years ago
- My proof-of-concept exploits for the Linux kernel☆1,450Updated 2 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,613Updated this week
- Mimikatz implementation in pure Python☆2,879Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,084Updated last month
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,422Updated 2 years ago
- A swiss army knife for pentesting networks☆8,457Updated 11 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,300Updated last month
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,040Updated last year