lockness-Ko / xz-vulnerable-honeypotLinks
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆144Updated last year
Alternatives and similar repositories for xz-vulnerable-honeypot
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
Sorting:
- ☆233Updated 11 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆210Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆272Updated 5 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆372Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆248Updated 3 weeks ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆252Updated last week
- nysm is a stealth post-exploitation container.☆255Updated 2 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆105Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆261Updated last month
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆285Updated last month
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆62Updated 3 weeks ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆305Updated 4 months ago
- reverse shell using curl☆207Updated 6 months ago
- CVE-2025-1974☆89Updated 4 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 months ago
- Different methods to get current username without using whoami☆178Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆349Updated 2 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆142Updated 7 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- Seamless remote browser session control☆206Updated last month
- Nameless C2 - A C2 with all its components written in Rust☆273Updated 11 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆138Updated 5 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated 11 months ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Updated last year
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆233Updated last year
- yet another AV killer tool using BYOVD☆295Updated last year
- Proof of concept & details for CVE-2025-21298☆189Updated 7 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year