lockness-Ko / xz-vulnerable-honeypot
An ssh honeypot with the XZ backdoor. CVE-2024-3094
โ141Updated 11 months ago
Alternatives and similar repositories for xz-vulnerable-honeypot:
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
- A delicious, but malicious SSL-VPN server ๐ฎโ216Updated 4 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.โ125Updated 3 weeks ago
- Get root via TTY / TIOCSTI stuffingโ70Updated 8 months ago
- Different methods to get current username without using whoamiโ174Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762โ99Updated 8 months ago
- โ230Updated 6 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.โ122Updated 11 months ago
- yet another AV killer tool using BYOVDโ268Updated last year
- nysm is a stealth post-exploitation container.โ245Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)โ257Updated 3 weeks ago
- Worlds First Public POC for CVE-2025-1974 lolโ49Updated this week
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Eventsโ215Updated 11 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionโ91Updated this week
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation fโฆโ169Updated 9 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerโฆโ353Updated 11 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434โ252Updated 7 months ago
- โ186Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Fileโ174Updated last week
- Nameless C2 - A C2 with all its components written in Rustโ262Updated 6 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scriptsโ33Updated this week
- โ225Updated 2 months ago
- reverse shell using curlโ205Updated last month
- A Rust implementation of GodPotato โ abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAโฆโ252Updated 2 months ago
- Make BASH stealthy and hacker friendly with lots of bash functionsโ246Updated this week
- โ298Updated 4 months ago
- An interactive shell to spoof some LOLBins command lineโ184Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.โ270Updated last year
- Proof of concept & details for CVE-2025-21298โ169Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingโ145Updated 10 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerabilityโ230Updated last year