mephistolist / titoView external linksLinks
In-Memory Rootkit For Linux and BSD
☆87Aug 9, 2025Updated 6 months ago
Alternatives and similar repositories for tito
Users that are interested in tito are comparing it to the libraries listed below
Sorting:
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- Another (bad) ROP gadget finder, but this time in Rust☆22Apr 9, 2024Updated last year
- ☆24Nov 19, 2024Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Jun 23, 2025Updated 7 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆167May 30, 2024Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- Collection of codes focused on Linux rootkits☆197Oct 22, 2025Updated 3 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆428Dec 9, 2025Updated 2 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288May 27, 2024Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- ☆41Mar 12, 2025Updated 11 months ago
- ☆18Mar 26, 2024Updated last year
- ☆21Nov 6, 2024Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated 11 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated last year
- Windows driver template, using C++20 & cmake & GithubActions☆24Aug 9, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- Windows rootkit designed to work with BYOVD exploits☆214Jan 18, 2025Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆74Jul 29, 2024Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆91Nov 13, 2025Updated 3 months ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆125Jul 12, 2024Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆52Aug 3, 2025Updated 6 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Feb 12, 2025Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- ☆44Apr 27, 2024Updated last year
- ☆27Feb 6, 2024Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 7 months ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- yet another hidden LKM hunter☆31Sep 18, 2025Updated 4 months ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 9 months ago