lockness-Ko / xz-vulnerable-honeypotLinks
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆142Updated last year
Alternatives and similar repositories for xz-vulnerable-honeypot
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
Sorting:
- ☆233Updated 9 months ago
- nysm is a stealth post-exploitation container.☆250Updated last week
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆242Updated 2 weeks ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆116Updated last month
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 3 weeks ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆367Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆233Updated 2 weeks ago
- reverse shell using curl☆206Updated 4 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆316Updated 3 weeks ago
- Worlds First Public POC for CVE-2025-1974☆89Updated 2 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆126Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆268Updated 9 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆267Updated 3 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆135Updated 3 months ago
- yet another AV killer tool using BYOVD☆292Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆224Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆145Updated 10 months ago
- Different methods to get current username without using whoami☆177Updated last year
- eBPF hacks☆187Updated 6 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆181Updated 9 months ago
- ☆7Updated 5 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆308Updated 3 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆169Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆276Updated last year
- MOVEit CVE-2023-34362☆139Updated 2 years ago
- ☆136Updated last year
- reverse shell using curl☆457Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year