mephistolist / tito
In-Memory Rootkit For Linux
☆70Updated last month
Alternatives and similar repositories for tito:
Users that are interested in tito are comparing it to the libraries listed below
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆73Updated last month
- Collection of codes focused on Linux rootkits☆98Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 3 months ago
- Get root via TTY / TIOCSTI stuffing☆70Updated 8 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆141Updated this week
- Monarch - The Adversary Emulation Toolkit☆61Updated 2 months ago
- UAC Bypass using CMSTP in Rust☆25Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆62Updated 3 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆168Updated 3 weeks ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated last week
- ☆103Updated 5 months ago
- A command and control framework.☆49Updated 3 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated 2 months ago
- ☆58Updated 5 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆98Updated last week
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- A Mythic Agent written in PIC C.☆185Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 6 months ago
- POC of GITHUB simple C2 in rust☆54Updated 2 months ago
- Repo for all my exploits/PoCs☆50Updated last month
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆87Updated 3 weeks ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated 2 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 9 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆64Updated 9 months ago
- Stage 0☆154Updated 3 months ago
- Windows Administrator level Implant.☆49Updated 6 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year