mephistolist / titoLinks
In-Memory Rootkit For Linux and BSD
☆82Updated 2 months ago
Alternatives and similar repositories for tito
Users that are interested in tito are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆126Updated 5 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Make an Linux Kernel rootkit visible again.☆57Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆73Updated 9 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- Collection of codes focused on Linux rootkits☆172Updated 3 weeks ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆214Updated last week
- Attacking the cleanup_module function of a kernel module☆46Updated 3 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆199Updated 7 months ago
- Execute shellcode via ASPNET compiler☆56Updated last week
- Monarch - The Adversary Emulation Toolkit☆63Updated 9 months ago
- ☆19Updated last month
- Analyse MSI files for vulnerabilities☆138Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆329Updated last month
- Get root via TTY / TIOCSTI stuffing☆76Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated 5 months ago
- Backdooring VSCode Projects☆79Updated 4 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆53Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated this week
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 6 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆152Updated 3 weeks ago
- A command and control framework.☆55Updated 9 months ago