List of possible Linux backdoors
☆15Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for linux_backdooring
Users that are interested in linux_backdooring are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Crypt::Curve25519☆12Jan 6, 2021Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- ☆12Oct 15, 2024Updated last year
- ☆10Aug 18, 2025Updated 7 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- unofficial grsecurity gpl release☆24Dec 18, 2018Updated 7 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- register with termux-api your wifi-stick on your android☆11Dec 18, 2022Updated 3 years ago
- Codes for series☆13Aug 15, 2022Updated 3 years ago
- ☆16Oct 4, 2012Updated 13 years ago
- DIY init for elaborate disk encryption☆11Jun 29, 2015Updated 10 years ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- Linux kernel for Qualcomm's Hexagon processors☆10Mar 14, 2013Updated 13 years ago
- Using the QOI image format to save sequences of images☆10Feb 12, 2022Updated 4 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- DHCP server that talks GRPC☆15Jul 8, 2017Updated 8 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Simulation of movement of a human character using forward and inverse kinematics☆14May 22, 2016Updated 9 years ago
- A module implementing various CRDT types (AWSet, PNCounter, LWWRegister, etc)☆13Mar 19, 2017Updated 9 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- protocall is an experimental programming language☆13Nov 20, 2016Updated 9 years ago
- Scalable, fault-tolerant, highly-available cache☆15Mar 17, 2017Updated 9 years ago
- Run any termux package as real root in your ADB shell☆14Dec 31, 2024Updated last year
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆12Jun 19, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Calculates the trajectory of the rocket based on motor and environment conditions in 3D. Includes compressible flow and Kalman filters.☆12Jan 6, 2016Updated 10 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Work in progress. (Not finished yet) Slim down (GNU) core utils to 64kB, statically linked with minilib.☆15Oct 30, 2023Updated 2 years ago
- ☆16Jan 23, 2022Updated 4 years ago