lockness-Ko / xz-vulnerable-honeypot
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆141Updated last year
Alternatives and similar repositories for xz-vulnerable-honeypot
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
Sorting:
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆296Updated 3 weeks ago
- nysm is a stealth post-exploitation container.☆248Updated last year
- Get root via TTY / TIOCSTI stuffing☆73Updated this week
- Make BASH stealthy and hacker friendly with lots of bash functions☆257Updated this week
- Worlds First Public POC for CVE-2025-1974 lol☆89Updated last month
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆114Updated this week
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆131Updated 2 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆278Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆219Updated 5 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆168Updated 11 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated last year
- Proof of concept & details for CVE-2025-21298☆180Updated 3 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 9 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆143Updated 8 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆365Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆277Updated 3 weeks ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆124Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆216Updated last year
- ☆187Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆102Updated 10 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆265Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 6 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆359Updated 3 weeks ago
- Nameless C2 - A C2 with all its components written in Rust☆266Updated 7 months ago
- Different methods to get current username without using whoami☆174Updated last year
- ☆320Updated last month
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 4 months ago
- yet another AV killer tool using BYOVD☆270Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆411Updated 6 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆274Updated last month