isdrupter / ziggystartuxLinks
A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!
☆41Updated 8 years ago
Alternatives and similar repositories for ziggystartux
Users that are interested in ziggystartux are comparing it to the libraries listed below
Sorting:
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- ☆65Updated 9 years ago
- ☆34Updated 5 years ago
- A Linux RAT in C☆34Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 12 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Execute ShellCode / "Inline-Assembler" in Python☆42Updated 8 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Linux v4.x.x Rootkit☆94Updated last year
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Resurrecting and updating the best log cleaner☆36Updated 10 years ago
- DNS server for pentesters☆50Updated last month
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Platform independent peCloak fork based on Capstone☆108Updated 9 years ago
- Watches for trigger packets, runs commands or spawns a shell☆25Updated 6 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆75Updated 6 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆125Updated 3 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago