fksvs / injectLinks
Packet crafting, injection and sniffing tool
☆70Updated last week
Alternatives and similar repositories for inject
Users that are interested in inject are comparing it to the libraries listed below
Sorting:
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- ☆32Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- PAM Backdoor☆32Updated 2 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Updated 9 months ago
- ☆37Updated 10 months ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Updated 2 years ago
- ☆19Updated 2 years ago
- ☆17Updated 8 months ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- ☆26Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 10 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 11 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- ☆33Updated 3 years ago
- Encrypt your git repo...☆50Updated 3 years ago
- Attacking the cleanup_module function of a kernel module☆54Updated 6 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year