List of possible Linux backdoors
☆15Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for linux_backdooring
Users that are interested in linux_backdooring are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GLIBC compatibility headers☆14Apr 22, 2021Updated 5 years ago
- ☆45Oct 16, 2023Updated 2 years ago
- Spawn Up quickly Elastic EDR Panel☆16Jan 29, 2022Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- ☆12Oct 15, 2024Updated last year
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆16Oct 27, 2024Updated last year
- ☆10Aug 18, 2025Updated 9 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆14Apr 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Oct 4, 2012Updated 13 years ago
- DIY init for elaborate disk encryption☆11Jun 29, 2015Updated 10 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆28Oct 22, 2020Updated 5 years ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Apr 17, 2026Updated last month
- A JX3 DPS Simulation Tool based on .NET WPF☆15Apr 6, 2026Updated last month
- A script for quickly configuring a stock set of common Android device emulators☆17Nov 5, 2013Updated 12 years ago
- Linux kernel for Qualcomm's Hexagon processors☆10Mar 14, 2013Updated 13 years ago
- Using the QOI image format to save sequences of images☆10Feb 12, 2022Updated 4 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- really ?☆12Feb 29, 2024Updated 2 years ago
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 7 months ago
- DHCP server that talks GRPC☆15Jul 8, 2017Updated 8 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Context-free grammar parsing library☆10Oct 6, 2024Updated last year
- Adding support s5l89xx support to QEMU☆15Aug 30, 2012Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python 3 alternative command line interface for AWS Route 53; enables simple record management and dynamic DNS☆11May 12, 2026Updated last week
- Source Code for 'Foundations of ARM64 Linux Debugging, Disassembling, and Reversing' by Dmitry Vostokov☆15Jan 20, 2023Updated 3 years ago
- 一款根据关键词批量采集url的小脚本,支持多个关键词批量采集。☆16Nov 22, 2022Updated 3 years ago
- Scalable, fault-tolerant, highly-available cache☆15Mar 17, 2017Updated 9 years ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 10 months ago
- A source-based Linux distribution with an unwavering adherence to the UNIX philosophy☆10Mar 23, 2026Updated 2 months ago