kpcyrd / sh4d0wupLinks
Signing-key abuse and update exploitation framework
☆129Updated last month
Alternatives and similar repositories for sh4d0wup
Users that are interested in sh4d0wup are comparing it to the libraries listed below
Sorting:
- Get root via TTY / TIOCSTI stuffing☆76Updated last month
- Quick network scanner library. https://crates.io/crates/qscan☆86Updated 2 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- Rust in-memory dumper☆108Updated last year
- Remote Command executor☆77Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 7 months ago
- ☆47Updated 2 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- eBPF hacks☆187Updated 6 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆27Updated 2 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆142Updated last year
- nysm is a stealth post-exploitation container.☆250Updated this week
- C2 Automation using Linode☆82Updated 2 years ago
- A Python gRPC Client Library for Sliver☆69Updated 2 months ago
- Executables on Disk? Bleh 🤮☆100Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Utility to find hidden Linux kernel modules☆144Updated 6 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Interactive results explorer and annotation tool for Nosey Parker☆32Updated last month
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- Artifact monitoring that ensures fairplay☆75Updated 4 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆127Updated 7 months ago