lockness-Ko / xz-vulnerable-honeypotLinks
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆144Updated last year
Alternatives and similar repositories for xz-vulnerable-honeypot
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
Sorting:
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆346Updated 2 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆259Updated 3 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆148Updated 8 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆279Updated 8 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 6 months ago
- nysm is a stealth post-exploitation container.☆265Updated 5 months ago
- ☆233Updated last year
- Different methods to get current username without using whoami☆182Updated last year
- ☆73Updated 9 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆271Updated this week
- A delicious, but malicious SSL-VPN server 🌮☆252Updated last month
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆123Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- SharePoint WebPart Injection Exploit Tool☆302Updated 3 months ago
- CVE-2025-1974☆90Updated 7 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆66Updated 3 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- 🌒 Shell command obfuscation to avoid detection systems☆123Updated 3 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆95Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆347Updated 6 months ago
- reverse shell using curl☆218Updated 8 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆146Updated 7 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆281Updated 2 years ago