Get root via TTY / TIOCSTI stuffing
☆77May 12, 2025Updated 9 months ago
Alternatives and similar repositories for ttyinject
Users that are interested in ttyinject are comparing it to the libraries listed below
Sorting:
- ☆46Dec 10, 2025Updated 2 months ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆141May 27, 2025Updated 9 months ago
- ☆16May 29, 2024Updated last year
- ☆29May 10, 2024Updated last year
- Ping-based Information Lookup and Outbound Transfer☆80Apr 16, 2024Updated last year
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆314Feb 8, 2026Updated 3 weeks ago
- ARP Man-in-the-Middle tool☆31Dec 17, 2024Updated last year
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- ☆16Jun 15, 2025Updated 8 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Binary and Static Releases☆16Feb 20, 2026Updated 2 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 10 months ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated 2 weeks ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Nov 7, 2024Updated last year
- ☆80Apr 18, 2023Updated 2 years ago
- ☆12May 21, 2025Updated 9 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆285Mar 5, 2025Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆39Dec 7, 2025Updated 3 months ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Zaps arguments and environment from the process list☆248Apr 26, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated last year
- ☆18Oct 28, 2025Updated 4 months ago
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆13Mar 5, 2024Updated 2 years ago
- Statically-built, dependency free binaries of software packages for Linux.☆14Feb 3, 2026Updated last month
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Jan 25, 2024Updated 2 years ago
- The AMSI server for Avred☆33Sep 15, 2023Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated 11 months ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago