kpcyrd / sh4d0wupLinks
Signing-key abuse and update exploitation framework
☆130Updated 4 months ago
Alternatives and similar repositories for sh4d0wup
Users that are interested in sh4d0wup are comparing it to the libraries listed below
Sorting:
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 11 months ago
- eBPF hacks☆187Updated 9 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 2 months ago
- Rust in-memory dumper☆108Updated 2 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆87Updated 2 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 8 months ago
- Detect and remove the presence of canary tokens☆23Updated last year
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- ☆49Updated 3 years ago
- Remote Command executor☆78Updated 2 years ago
- LD_PRELOAD rootkit☆138Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆98Updated 2 years ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆110Updated 2 months ago
- Linux Enumeration / Privilege escalation tool☆26Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- Mara is a userland pty/tty sniffer☆54Updated last year
- ☆134Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- NIST-based CVE lookup store and API powered by Rust.☆132Updated 2 weeks ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago