List of possible Linux backdoors
☆15Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for linux_backdooring
Users that are interested in linux_backdooring are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GLIBC compatibility headers☆14Apr 22, 2021Updated 4 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Spawn Up quickly Elastic EDR Panel☆16Jan 29, 2022Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- 基于http代理的web漏洞扫描器的实现☆10Jul 5, 2015Updated 10 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Jan 5, 2022Updated 4 years ago
- ☆12Oct 15, 2024Updated last year
- Fork of http://code.nsnam.org/thehajime/elf-loader/ for unlimited dlmopen namespaces☆21Oct 11, 2023Updated 2 years ago
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆16Oct 27, 2024Updated last year
- ☆10Aug 18, 2025Updated 7 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- unofficial grsecurity gpl release☆24Dec 18, 2018Updated 7 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- register with termux-api your wifi-stick on your android☆11Dec 18, 2022Updated 3 years ago
- Codes for series☆13Aug 15, 2022Updated 3 years ago
- ☆13Apr 12, 2024Updated 2 years ago
- ☆16Oct 4, 2012Updated 13 years ago
- DIY init for elaborate disk encryption☆11Jun 29, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆11Apr 10, 2021Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- A JX3 DPS Simulation Tool based on .NET WPF☆15Apr 6, 2026Updated last week
- A script for quickly configuring a stock set of common Android device emulators☆17Nov 5, 2013Updated 12 years ago
- Linux kernel for Qualcomm's Hexagon processors☆10Mar 14, 2013Updated 13 years ago
- Using the QOI image format to save sequences of images☆10Feb 12, 2022Updated 4 years ago
- DHCP server that talks GRPC☆15Jul 8, 2017Updated 8 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆137Feb 4, 2026Updated 2 months ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Simulation of movement of a human character using forward and inverse kinematics☆13May 22, 2016Updated 9 years ago
- Python 3 alternative command line interface for AWS Route 53; enables simple record management and dynamic DNS☆11Feb 27, 2026Updated last month
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago