x86_64 LKM linux rootkit
☆16Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for dolus
Users that are interested in dolus are comparing it to the libraries listed below
Sorting:
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Dec 1, 2025Updated 3 months ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- Graphical map of known Advanced Persistent Threats☆63Jan 31, 2026Updated last month
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- A parser for Microsoft PDB (Program Database) debugging information☆23Nov 5, 2024Updated last year
- PHP tool to test XSS☆22Nov 5, 2019Updated 6 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional…☆12Feb 5, 2025Updated last year
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- 🚇 A simple TLS tunneling implementation, written in Rust.☆24Oct 14, 2020Updated 5 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆42Jan 14, 2026Updated last month
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A unique interactive and visual D2 companion experience.☆13Sep 22, 2021Updated 4 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Nov 2, 2023Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- Add or Delete User via windows api,it can be used when .net is inaccessible.☆39Feb 8, 2020Updated 6 years ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆94Nov 21, 2020Updated 5 years ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago
- A python module for downloading US Government Publishing Office datasets in bulk.☆11Jun 9, 2021Updated 4 years ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago