mempodippy / detect_preloadLinks
Small C application designed to detect LD_PRELOAD malware via the libdl library functions.
☆56Updated 9 years ago
Alternatives and similar repositories for detect_preload
Users that are interested in detect_preload are comparing it to the libraries listed below
Sorting:
- Post module for Metasploit to execute ELF in memory☆86Updated 7 years ago
- MS17-010 exploits, payloads, and scanners☆97Updated 8 years ago
- CVE-2017-7269 to webshell or shellcode loader☆88Updated 8 years ago
- Purelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.☆58Updated 6 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119Updated 9 years ago
- MS15-076 Privilege Escalation☆101Updated 10 years ago
- Dump various types of Windows credentials without injecting in any process.☆27Updated 10 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 7 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆141Updated 4 years ago
- Powershell to copy ntds.dit☆62Updated 9 years ago
- Unified repository for different Metasploit Framework payloads☆49Updated 6 years ago
- IDS Bypass tricks☆122Updated 7 years ago
- ☆127Updated 6 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 12 years ago
- JavaPayload is a collection of pure Java payloads to be used for post-exploitation from pure Java exploits or from common misconfiguratio…☆125Updated last year
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- Support x86 and x64☆66Updated 4 years ago
- Create a hidden account☆74Updated 8 years ago
- CVE20178570☆95Updated 8 years ago
- proof of concept exploit for Microsoft Windows 7 and Server 2008 RDP vulnerability☆47Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 6 years ago
- Use Waitfor.exe to maintain persistence☆55Updated 4 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Updated 8 years ago
- Small modification version of p0wnedShell☆40Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Updated 9 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- mig meterpreter stager☆43Updated 11 years ago
- Metasploit Framework☆31Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- Stealing passwords every time they change☆66Updated 5 years ago