mephistolist / titoLinks
In-Memory Rootkit For Linux and BSD
☆86Updated 4 months ago
Alternatives and similar repositories for tito
Users that are interested in tito are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 8 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 10 months ago
- Generate backdoored RSA keys using SETUP☆225Updated last month
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Get root via TTY / TIOCSTI stuffing☆75Updated 7 months ago
- This is practice VM for malware development☆174Updated last month
- Analyse MSI files for vulnerabilities☆140Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆257Updated 3 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆67Updated 5 months ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆353Updated 4 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆144Updated 11 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆44Updated last year
- Attacking the cleanup_module function of a kernel module☆54Updated 6 months ago
- Collection of codes focused on Linux rootkits☆190Updated 2 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- Proof Of Concepts☆55Updated this week
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last month
- ☆20Updated 2 months ago