icco / backdoor
A Linux Kernel Module that adds a backdoor to your system
☆39Updated 15 years ago
Related projects ⓘ
Alternatives and complementary repositories for backdoor
- Small Backdoor/rootkit for linux kernel☆21Updated 10 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆49Updated 10 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆41Updated 8 years ago
- ☆92Updated 6 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- ☆34Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Unix remote login tool, rootkit shell tool☆35Updated 9 years ago
- libpcap based ICMP encrypted backdoor for linux.☆129Updated 3 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Projects and POCs☆58Updated 10 years ago
- This is a kernel module invoked reverse shell proof of concept.☆71Updated 5 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- An educational Linux Kernel Rootkit☆30Updated 3 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Some NSE scripts to search information from routers☆37Updated 8 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 11 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆82Updated last year
- Linux v4.x.x Rootkit☆86Updated 3 months ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 7 years ago
- ☆20Updated 10 months ago