mephistolist / titoLinks
In-Memory Rootkit For Linux
☆70Updated this week
Alternatives and similar repositories for tito
Users that are interested in tito are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆112Updated last month
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Collection of codes focused on Linux rootkits☆110Updated 3 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆61Updated 5 months ago
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- A Mythic Agent written in PIC C.☆188Updated 4 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- POC of GITHUB simple C2 in rust☆53Updated 4 months ago
- ☆18Updated 2 weeks ago
- ☆107Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated this week
- Python3 utility for creating zip files that smuggle additional data for later extraction☆211Updated 3 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆102Updated 3 weeks ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- Monarch - The Adversary Emulation Toolkit☆62Updated 5 months ago
- UAC Bypass using CMSTP in Rust☆27Updated 6 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated last month
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆24Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆180Updated last month
- ☆55Updated last month
- ☆59Updated 8 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 weeks ago
- Stage 0☆160Updated 5 months ago
- ☆158Updated last month
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆183Updated 4 months ago
- ☆54Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆191Updated 3 months ago
- Analyse MSI files for vulnerabilities☆131Updated 9 months ago