lockness-Ko / xz-vulnerable-honeypot
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆143Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for xz-vulnerable-honeypot
- Make BASH stealthy and hacker friendly with lots of bash functions☆199Updated last week
- nysm is a stealth post-exploitation container.☆237Updated 11 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆239Updated 9 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆343Updated 7 months ago
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆215Updated 7 months ago
- Nameless C2 - A C2 with all its components written in Rust☆242Updated last month
- yet another AV killer tool using BYOVD☆263Updated 11 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆134Updated 2 months ago
- This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be…☆178Updated this week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆241Updated 3 months ago
- ☆493Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆285Updated last month
- ☆220Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆157Updated 2 months ago
- reverse shell using curl☆205Updated 7 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆93Updated 4 months ago
- eBPF hacks☆173Updated 2 months ago
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆125Updated last week
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated 10 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆99Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆147Updated 6 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆338Updated 2 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆281Updated 10 months ago
- A command and control framework written in rust.☆282Updated last month
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆380Updated last year
- ☆283Updated last week