lockness-Ko / xz-vulnerable-honeypot
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆144Updated 5 months ago
Related projects: ⓘ
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆236Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆170Updated this week
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆208Updated 5 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆149Updated 3 months ago
- nysm is a stealth post-exploitation container.☆235Updated 9 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆339Updated 5 months ago
- Different methods to get current username without using whoami☆170Updated 7 months ago
- Get root via TTY / TIOCSTI stuffing☆60Updated 2 months ago
- ☆181Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆127Updated last week
- reverse shell using curl☆203Updated 5 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆371Updated 2 weeks ago
- yet another AV killer tool using BYOVD☆259Updated 9 months ago
- NTP Exfiltration Tool☆132Updated 10 months ago
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- eBPF hacks☆170Updated last week
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆119Updated 3 weeks ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆539Updated 2 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆120Updated 3 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆327Updated 2 weeks ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆277Updated 8 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆214Updated last month
- Repository to store exploits created by Assetnotes Security Research team☆175Updated 10 months ago
- Ping-based Information Lookup and Outbound Transfer☆70Updated 5 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆119Updated 4 months ago
- ☆282Updated 9 months ago
- ☆474Updated 5 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆245Updated last year
- A command and control framework written in rust.☆245Updated this week
- Simulate the behavior of AV/EDR for malware development training.☆443Updated 7 months ago