icco / backdoor
A Linux Kernel Module that adds a backdoor to your system
☆39Updated 15 years ago
Alternatives and similar repositories for backdoor:
Users that are interested in backdoor are comparing it to the libraries listed below
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 11 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- SSH Based Remote Administration Tool☆104Updated 9 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 3 years ago
- ☆93Updated 6 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- ☆34Updated 8 years ago
- Unix remote login tool, rootkit shell tool☆35Updated 9 years ago
- Linux Kernel Rootkit - To hide modules and ssh service☆51Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago
- Projects and POCs☆59Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- An educational Linux Kernel Rootkit☆31Updated 3 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 8 years ago
- [Windows] Local Privilege Escalation - WebClient☆57Updated 7 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- ☆127Updated 9 years ago