mhaskar / Linux-Root-Kit
Simple Linux RootKit written in python
☆10Updated 7 years ago
Alternatives and similar repositories for Linux-Root-Kit
Users that are interested in Linux-Root-Kit are comparing it to the libraries listed below
Sorting:
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- C# AV bypass jank☆32Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- ☆16Updated 10 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- A Linux RAT in C☆33Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Template for asynchronously controlling meterpreter sessions☆12Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 4 years ago