maK- / reverse-shell-access-kernel-module
This is a kernel module invoked reverse shell proof of concept.
☆72Updated 5 years ago
Alternatives and similar repositories for reverse-shell-access-kernel-module:
Users that are interested in reverse-shell-access-kernel-module are comparing it to the libraries listed below
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 5 years ago
- public exploits☆35Updated last year
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆33Updated 9 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆43Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Windows Reverse Shell shellcode☆61Updated 2 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Linux v4.x.x Rootkit☆89Updated 7 months ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- PoC materials to exploit CVE-2019-15846☆30Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 3 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆56Updated 4 years ago
- Test and exploit for CVE-2017-12542☆86Updated 6 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- with metasploit☆63Updated 4 years ago
- ☆72Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 5 months ago
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 7 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- ☆52Updated 5 years ago
- ☆36Updated 6 years ago
- Gogs CVEs☆78Updated 5 years ago