hc0d3r / tas
A tiny framework for easily manipulate the tty and create fake binaries.
☆155Updated 5 years ago
Alternatives and similar repositories for tas:
Users that are interested in tas are comparing it to the libraries listed below
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆65Updated 8 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 3 years ago
- Windows Reverse Shell shellcode☆61Updated 2 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- A Linux RAT in C☆32Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆68Updated 5 years ago
- ELF binary infector☆32Updated 13 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Linux v4.x.x Rootkit☆89Updated 8 months ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- ssh-client worm☆155Updated 5 years ago
- All about the remote administrative tools☆35Updated 9 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 6 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Proof of calc for CVE-2019-6453☆49Updated last year