isdrupter / ziggystartux
A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!
☆40Updated 7 years ago
Alternatives and similar repositories for ziggystartux:
Users that are interested in ziggystartux are comparing it to the libraries listed below
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆77Updated last year
- Resurrecting and updating the best log cleaner☆31Updated 10 years ago
- A Linux RAT in C☆31Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- ☆43Updated 5 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- My little precious collection of Linux 4.x kernel rootkits☆25Updated 6 months ago
- DNS Botnet Server and Client☆34Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Utility to inject honey tokens into lsass.☆27Updated 8 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- ☆24Updated 6 years ago
- ☆31Updated 4 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- This is a concept poc of command and control server implemented over blockchain☆51Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Sources code extracted from malwares for analysis☆36Updated last year
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 11 years ago
- ☆65Updated 8 years ago