hackerschoice / ttyinjectLinks
Get root via TTY / TIOCSTI stuffing
☆77Updated 5 months ago
Alternatives and similar repositories for ttyinject
Users that are interested in ttyinject are comparing it to the libraries listed below
Sorting:
- IPSpinner works as a local proxy that redirects requests through external services.☆103Updated 7 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆91Updated 4 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆121Updated last month
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆144Updated 9 months ago
- rcat☆71Updated 3 years ago
- Automate converting webshells into reverse shells.☆71Updated 2 weeks ago
- Detect common NFS server misconfigurations☆68Updated 5 months ago
- Speedy probe-based UDP service scanner☆103Updated last week
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated last week
- ☆61Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆147Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- POC for DLL Proxying / Hijacking☆62Updated 5 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆85Updated 8 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆278Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- ☆71Updated 7 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆338Updated 2 months ago
- Java archive implant toolkit.☆61Updated 6 months ago
- Rust in-memory dumper☆108Updated 2 years ago
- ysoserial.net docker image☆28Updated last year
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆220Updated 8 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 6 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 9 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆22Updated last year