LD_PRELOAD rootkit
☆140Feb 29, 2024Updated 2 years ago
Alternatives and similar repositories for Father
Users that are interested in Father are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Windows NTLM Authentication Backdoor☆18Jan 27, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LD_PRELOAD Rootkit☆313Apr 5, 2025Updated last year
- In line function hooking LKM rootkit☆54Mar 5, 2020Updated 6 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆134Sep 19, 2021Updated 4 years ago
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- bdvl☆116Feb 26, 2022Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- Cross-platform RAT, written in C☆88Oct 8, 2022Updated 3 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 4 months ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Apr 8, 2020Updated 6 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,964Apr 7, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆28Nov 23, 2025Updated 5 months ago
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated 2 months ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- DLL Injector as a service that watches the health of the started thread.☆11Feb 3, 2020Updated 6 years ago
- Windows NTLM Authentication Backdoor☆242Jan 15, 2025Updated last year
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Collection of Slides From My Conference Talks☆21Nov 21, 2022Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- ld_preload userland rootkit☆35Dec 13, 2020Updated 5 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 5 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago