Self replicating and automatically spreading SSH worm that recovers login credentials
☆55Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for ssh-it
Users that are interested in ssh-it are comparing it to the libraries listed below
Sorting:
- cyber security notes for your consumption.☆14Jul 30, 2024Updated last year
- This is IPFS web3.storage unofficial library written in python. I have made it simple and easier to integrate with web3.storage API using…☆14Oct 27, 2023Updated 2 years ago
- ARP Man-in-the-Middle tool☆31Dec 17, 2024Updated last year
- ☆37Jun 30, 2022Updated 3 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 3 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆142May 27, 2025Updated 9 months ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- Easily deploy xmrig for cryptonight mining.☆12Aug 10, 2020Updated 5 years ago
- ☆351May 25, 2023Updated 2 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Get root via TTY / TIOCSTI stuffing☆77May 12, 2025Updated 10 months ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts☆13Apr 14, 2024Updated last year
- A programming language that compiles to Minecraft datapacks☆15Dec 1, 2023Updated 2 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 8 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- ☆38Apr 15, 2025Updated 11 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Oct 3, 2020Updated 5 years ago
- eBPF hacks☆197Dec 12, 2024Updated last year
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- 🖼 imgify - Convert any file to PNG and back.☆13Oct 20, 2025Updated 5 months ago
- Connect like there is no firewall. Securely.☆1,833Mar 7, 2026Updated 2 weeks ago
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Apr 8, 2020Updated 5 years ago
- ☆19Jan 16, 2026Updated 2 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Console command lines, security tools and some useful macros to automate this repository's tools. (MacOs, Linux, Windows)☆21May 7, 2024Updated last year