krisnova / boopkit
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
☆1,571Updated last year
Related projects ⓘ
Alternatives and complementary repositories for boopkit
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,785Updated 7 months ago
- Credentials Dumper for Linux using eBPF☆1,116Updated 2 months ago
- ebpfkit is a rootkit powered by eBPF☆761Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆2,912Updated 7 months ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆799Updated last year
- Operational information regarding the Spring4Shell vulnerability in the Spring Core Framework☆173Updated last year
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆548Updated 4 months ago
- Connect like there is no firewall. Securely.☆1,541Updated last week
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,092Updated 2 years ago
- Scan memory for secrets and more. Maybe eventually a full /proc toolkit.☆610Updated 2 years ago
- CVE-2022-0995 exploit☆495Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,344Updated this week
- Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.☆765Updated 2 weeks ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆3,937Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,358Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,426Updated this week
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆928Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆779Updated 2 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,381Updated this week
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,097Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,124Updated 4 months ago
- CVE-2022-25636☆426Updated 2 years ago
- Redress - A tool for analyzing stripped Go binaries☆951Updated 2 weeks ago
- SSH based reverse shell☆966Updated this week
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,175Updated 3 months ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,149Updated 4 years ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,725Updated this week
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 2 years ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆863Updated this week
- A GNU/Linux monitoring and profiling tool focused on single processes.☆672Updated 3 years ago