hackerschoice / ttyinjectLinks
Get root via TTY / TIOCSTI stuffing
☆76Updated 6 months ago
Alternatives and similar repositories for ttyinject
Users that are interested in ttyinject are comparing it to the libraries listed below
Sorting:
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆111Updated 8 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆93Updated 5 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆87Updated 9 months ago
- A cross platform library to write offensive and defensive security tools in Go☆129Updated 2 weeks ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆74Updated last month
- rcat☆72Updated 3 years ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 4 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆253Updated 2 months ago
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- ☆62Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Local & remote Windows DLL Proxying☆169Updated last year
- Rust in-memory dumper☆108Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 9 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆280Updated 9 months ago
- Pre-Auth Exploit for CVE-2024-40711☆54Updated last year
- Enumerate Domain Users Without Authentication☆277Updated 7 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆151Updated 4 months ago
- ☆74Updated 10 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆92Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆184Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- Stage 0☆167Updated 11 months ago
- POC for DLL Proxying / Hijacking☆62Updated 6 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆61Updated this week