maK- / reverse-shell-access-kernel-moduleLinks
This is a kernel module invoked reverse shell proof of concept.
☆72Updated 5 years ago
Alternatives and similar repositories for reverse-shell-access-kernel-module
Users that are interested in reverse-shell-access-kernel-module are comparing it to the libraries listed below
Sorting:
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- Linux v4.x.x Rootkit☆91Updated 11 months ago
- ☆33Updated 9 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆185Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆63Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- public exploits☆35Updated 2 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- A malicious Apache module with rootkit functionality☆1Updated 10 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆74Updated 10 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Execute ShellCode / "Inline-Assembler" in Python☆42Updated 8 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- import pyd or execute PE all from memory using only pure python code and some shellcode tricks☆74Updated 8 years ago
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- ☆80Updated 11 years ago
- HP printer security research code☆91Updated 7 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- A way to backdoor every process☆66Updated 7 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago