hackerschoice / ttyinjectLinks
Get root via TTY / TIOCSTI stuffing
☆76Updated 6 months ago
Alternatives and similar repositories for ttyinject
Users that are interested in ttyinject are comparing it to the libraries listed below
Sorting:
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆92Updated 4 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆106Updated 8 months ago
- rcat☆72Updated 3 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆279Updated 8 months ago
- A cross platform library to write offensive and defensive security tools in Go☆129Updated this week
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆252Updated last month
- Automate converting webshells into reverse shells.☆71Updated last week
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 6 months ago
- Speedy probe-based UDP service scanner☆104Updated 3 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- Convert your shellcode into an ASCII string☆125Updated 4 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- ☆62Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆346Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated last week
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 3 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆240Updated 2 weeks ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆265Updated this week
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 8 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Updated 7 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆255Updated 6 months ago