kpcyrd / sh4d0wup
Signing-key abuse and update exploitation framework
☆123Updated 2 weeks ago
Alternatives and similar repositories for sh4d0wup:
Users that are interested in sh4d0wup are comparing it to the libraries listed below
- Rust in-memory dumper☆105Updated last year
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆125Updated 3 months ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆94Updated last year
- Get root via TTY / TIOCSTI stuffing☆69Updated 7 months ago
- Cloud Exploit Framework☆113Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆82Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- WallEscape vulnerability in util-linux☆50Updated 10 months ago
- A Python gRPC Client Library for Sliver☆67Updated 2 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆62Updated 10 months ago
- ☆46Updated 2 years ago
- LD_PRELOAD rootkit☆129Updated 11 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- ☆105Updated 3 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- nysm is a stealth post-exploitation container.☆243Updated last year
- masscan with exclusive excludes☆55Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 2 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆48Updated 11 months ago
- Rust Weaponization for Red Team Engagements.☆27Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆137Updated 5 months ago
- eBPF hacks☆182Updated 2 months ago
- Remote Command executor☆72Updated last year
- Source Code Management Attack Toolkit☆129Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆86Updated last week
- ☆125Updated last year
- Find what egress ports are allowed☆39Updated 2 years ago