hackerschoice / ttyinject
Get root via TTY / TIOCSTI stuffing
☆68Updated 6 months ago
Alternatives and similar repositories for ttyinject:
Users that are interested in ttyinject are comparing it to the libraries listed below
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆136Updated 2 weeks ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆83Updated 3 weeks ago
- Socks5 / Socks4 client and server library☆70Updated 3 weeks ago
- Local & remote Windows DLL Proxying☆161Updated 7 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆115Updated 8 months ago
- Stage 0☆148Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆153Updated last month
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆103Updated last month
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆143Updated 2 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆169Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆67Updated 3 months ago
- Python tool to interact with WMI StdRegProv☆54Updated 2 months ago
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆122Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆135Updated 5 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆119Updated 9 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Multiplayer pivoting solution☆130Updated this week
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆66Updated 2 weeks ago
- Tool for Active Directory Certificate Services enumeration and abuse☆102Updated this week
- ☆55Updated last year
- Just another C2 Redirector using CloudFlare.☆84Updated 8 months ago
- rcat☆64Updated 2 years ago
- random code snippets, useful for getting started☆115Updated 2 months ago
- Monarch - The Adversary Emulation Toolkit☆61Updated 3 weeks ago
- ☆106Updated 2 months ago
- Find .net assemblies locally☆104Updated 2 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆59Updated last year
- Your syscall factory☆122Updated 2 weeks ago