kevien / saruman
ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)
☆10Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for saruman
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆240Updated 5 years ago
- CVE-2021-3156非交互式执行命令☆199Updated 3 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆115Updated 8 years ago
- ☆143Updated 6 years ago
- integration ms17010 and nsa-EternalBlue☆37Updated 6 years ago
- Yet another SharpSphere☆222Updated 3 years ago
- Source: http://rootkiter.com/Termite/☆25Updated 7 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆136Updated 4 years ago
- 一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-442…☆122Updated 2 years ago
- 一款基于Http.sys的利用工具☆188Updated 2 years ago
- Container (Docker) escape exploits☆50Updated 2 years ago
- ☆81Updated 2 years ago
- Toolkit for AWD or other CTF offline matches☆34Updated 6 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆185Updated 4 years ago
- Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物☆223Updated last year
- WIP: Demo for Attacking Apereo CAS☆85Updated 4 years ago
- Linux下用于远程加载可执行文件以达到内存加载的目的☆198Updated 2 years ago
- dns tunnel C2☆82Updated 2 years ago
- CVE-2022-2639 Linux kernel openvswitch local privilege escalation☆108Updated 2 years ago
- ☆140Updated 4 years ago
- docker 未授权访问漏洞利用脚本☆141Updated 8 years ago
- This project is used to collect the EXP/POC disclosed on the Internet and provide project support for Heptagram security team.☆80Updated 5 months ago
- RMI 反序列化环境 一步步☆211Updated 4 years ago
- PHP 扩展, 用于 PHP-FPM、FastCGI、LD_PRELOAD等模式下突破 disabled_functions☆104Updated 3 years ago
- ☆110Updated 4 years ago