isdrupter / ziggystartuxLinks
A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!
☆40Updated 7 years ago
Alternatives and similar repositories for ziggystartux
Users that are interested in ziggystartux are comparing it to the libraries listed below
Sorting:
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 4 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- A Linux RAT in C☆33Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- ☆31Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- ☆65Updated 8 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Resurrecting and updating the best log cleaner☆31Updated 10 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆59Updated 12 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- A rogue DNS detector☆23Updated last year
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- OpenSSH 6.7p1 backdoor kit☆21Updated 10 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago