f0rb1dd3n / ReptileLinks
LKM Linux rootkit
☆2,730Updated 4 years ago
Alternatives and similar repositories for Reptile
Users that are interested in Reptile are comparing it to the libraries listed below
Sorting:
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,035Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,069Updated 2 years ago
- Linux privilege escalation auditing tool☆5,965Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,544Updated 7 months ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,380Updated last year
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,088Updated 2 months ago
- Monitor linux processes without root permissions☆5,452Updated 2 years ago
- MS17-010☆2,190Updated last year
- Windows Exploit Suggester - Next Generation☆4,438Updated last week
- Linux Exploit Suggester; based on operating system release number☆1,791Updated 11 years ago
- awesome-linux-rootkits☆1,846Updated 4 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,572Updated 3 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,912Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,241Updated last month
- windows-kernel-exploits Windows平台提权漏洞集合☆8,320Updated 3 years ago
- Simple reverse ICMP shell☆1,590Updated 7 years ago
- ☆3,593Updated last year
- linux-kernel-exploits Linux平台提权漏洞集合☆5,425Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,610Updated last year
- A tool to dump the login password from the current linux user☆3,953Updated 2 years ago
- A swiss army knife for pentesting networks☆8,745Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,618Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,835Updated last week
- ☆1,154Updated 8 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,873Updated 4 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆799Updated last year
- Mimikatz implementation in pure Python☆3,035Updated this week
- ✍️ A curated list of CVE PoCs.☆3,406Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,372Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,272Updated last year