lockness-Ko / xz-vulnerable-honeypot
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆141Updated last year
Alternatives and similar repositories for xz-vulnerable-honeypot:
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
- nysm is a stealth post-exploitation container.☆246Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆363Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆111Updated 2 weeks ago
- Worlds First Public POC for CVE-2025-1974 lol☆86Updated 3 weeks ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆229Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆143Updated 8 months ago
- A delicious, but malicious SSL-VPN server 🌮☆218Updated 4 months ago
- ☆233Updated 6 months ago
- Different methods to get current username without using whoami☆174Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆168Updated 10 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆261Updated last month
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆129Updated last month
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆273Updated 3 months ago
- reverse shell using curl☆206Updated 2 months ago
- Get root via TTY / TIOCSTI stuffing☆71Updated 9 months ago
- Nameless C2 - A C2 with all its components written in Rust☆266Updated 6 months ago
- ☆186Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆86Updated 5 months ago
- Windows Persistence IT-Security☆97Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆375Updated 6 months ago
- yet another AV killer tool using BYOVD☆270Updated last year
- Evasive shellcode loader☆358Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 4 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆215Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 8 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆290Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆101Updated 9 months ago
- Proof of concept & details for CVE-2025-21298☆175Updated 3 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 7 months ago