isdrupter / ziggystartux
A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!
☆40Updated 7 years ago
Alternatives and similar repositories for ziggystartux:
Users that are interested in ziggystartux are comparing it to the libraries listed below
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆77Updated last year
- Resurrecting and updating the best log cleaner☆31Updated 10 years ago
- A Linux RAT in C☆32Updated 6 years ago
- ☆65Updated 8 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- ☆67Updated last year
- ☆31Updated 4 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 11 years ago
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆57Updated 12 years ago
- A tiny framework for easily manipulate the tty and create fake binaries.☆154Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- Sources code extracted from malwares for analysis☆36Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- Cyberdelia, a Collection of Command and Control frameworks☆63Updated 5 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- CLI tool to analyze PE files☆86Updated 3 months ago
- Modular rootkit framework.☆27Updated 3 years ago
- A logging ASKPASS binary☆29Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Malware captured with honeypots☆35Updated 7 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago