List of possible Linux backdoors
☆15Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for linux_backdooring
Users that are interested in linux_backdooring are comparing it to the libraries listed below
Sorting:
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- GLIBC compatibility headers☆13Apr 22, 2021Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- Objective: Crack a Wi-Fi network’s password using a Wi-Fi adaptor with Kali Linux.☆12Dec 21, 2021Updated 4 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Android Tools & Builds Basket for mk808, etc☆16Jul 22, 2021Updated 4 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆55Nov 17, 2025Updated 3 months ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- A web Snapchat clone.☆10Dec 28, 2016Updated 9 years ago
- A script for quickly configuring a stock set of common Android device emulators☆17Nov 5, 2013Updated 12 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Ubuntu Unity Desktop Shell☆11Sep 26, 2018Updated 7 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- Linux kernel for Qualcomm's Hexagon processors☆10Mar 14, 2013Updated 12 years ago
- An IOS Photo Direction Repair Tool / IOS拍照方向修复工具、前端图片压缩工具☆14Mar 4, 2023Updated 3 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Feb 4, 2026Updated 3 weeks ago
- ☆10Jun 30, 2021Updated 4 years ago
- A tool for managing software RAID under Linux☆16Apr 23, 2014Updated 11 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Mozilla list of RPs and Groups for SSO-Dashboard☆12Updated this week
- security course list☆14Sep 18, 2015Updated 10 years ago
- ☆15Oct 4, 2012Updated 13 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆12Feb 13, 2026Updated 2 weeks ago
- Python 3 alternative command line interface for AWS Route 53; enables simple record management and dynamic DNS☆11Updated this week
- ☆12Jan 6, 2017Updated 9 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago