hc0d3r / tas
A tiny framework for easily manipulate the tty and create fake binaries.
☆155Updated 4 years ago
Alternatives and similar repositories for tas:
Users that are interested in tas are comparing it to the libraries listed below
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- Rootkit Detector for UNIX☆62Updated last year
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 3 years ago
- All about the remote administrative tools☆35Updated 9 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- ssh-client worm☆154Updated 4 years ago
- ☆43Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆92Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆24Updated 6 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 4 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- DNS Botnet Server and Client☆34Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- A Linux RAT in C☆31Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- ☆65Updated 8 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆116Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago