krisnova / boopkit
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
☆1,598Updated last year
Alternatives and similar repositories for boopkit:
Users that are interested in boopkit are comparing it to the libraries listed below
- Credentials Dumper for Linux using eBPF☆1,136Updated 6 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,827Updated 11 months ago
- a drop-in replacement for Nmap powered by shodan.io☆2,990Updated last month
- ebpfkit is a rootkit powered by eBPF☆783Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,659Updated last week
- SSH-MITM - ssh audits made simple☆1,380Updated 3 weeks ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆953Updated 2 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆594Updated 8 months ago
- Operational information regarding the Spring4Shell vulnerability in the Spring Core Framework☆175Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,753Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆823Updated 2 weeks ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,802Updated 3 weeks ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,094Updated 3 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,141Updated 3 weeks ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆787Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,389Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,883Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,550Updated 3 weeks ago
- Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.☆788Updated this week
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆695Updated last year
- awesome-linux-rootkits☆1,807Updated 2 months ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆565Updated 2 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,521Updated 3 weeks ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,158Updated 2 months ago
- Redress - A tool for analyzing stripped Go binaries☆1,012Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,646Updated 8 months ago
- Linux Runtime Security and Forensics using eBPF☆3,821Updated this week
- Scan memory for secrets and more. Maybe eventually a full /proc toolkit.☆645Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,430Updated last year
- An OOB interaction gathering server and client library☆3,664Updated this week