mephistolist / tito
In-Memory Rootkit For Linux
☆69Updated this week
Alternatives and similar repositories for tito:
Users that are interested in tito are comparing it to the libraries listed below
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆100Updated last week
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Get root via TTY / TIOCSTI stuffing☆71Updated 9 months ago
- ☆105Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆82Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆42Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 4 months ago
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- Collection of codes focused on Linux rootkits☆106Updated last month
- ☆51Updated 2 months ago
- ☆58Updated 6 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated 2 weeks ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated 11 months ago
- Covert data exfiltration via DNS☆43Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- A Mythic Agent written in PIC C.☆186Updated 2 months ago
- Stage 0☆156Updated 4 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆111Updated 2 weeks ago
- ☆18Updated last month
- Monarch - The Adversary Emulation Toolkit☆62Updated 3 months ago
- Windows Administrator level Implant.☆49Updated 6 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆45Updated last month
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆177Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆77Updated this week
- Analyse MSI files for vulnerabilities☆129Updated 7 months ago