gquere / linux_backdooringLinks
List of possible Linux backdoors
☆14Updated 5 years ago
Alternatives and similar repositories for linux_backdooring
Users that are interested in linux_backdooring are comparing it to the libraries listed below
Sorting:
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 3 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 4 years ago
- ☆16Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- A way to backdoor every process☆66Updated 7 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- The Hunt for Malicious Strings☆13Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Malicious DLL Generator in Py3☆26Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- In 'n Out - See what goes in and comes out of PEs☆35Updated 3 years ago
- wordlists for password cracking☆28Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago