monsieurPale / RSA-BackdoorLinks
☆163Updated last week
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below
Sorting:
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆132Updated 7 months ago
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- Payload encoding utility to effectively lower payload entropy.☆120Updated 7 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- POC of GITHUB simple C2 in rust☆52Updated 4 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆158Updated 5 months ago
- Execute shellcode via ASPNET compiler☆58Updated 2 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆87Updated 9 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆66Updated 3 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Updated 10 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆346Updated 3 months ago
- Obex – Blocking unwanted DLLs in user mode☆266Updated 2 months ago
- ☆164Updated 9 months ago
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- Permanently disable EDRs as local admin☆121Updated last month
- Backdooring VSCode Projects☆81Updated 5 months ago
- Enumerate active EDR's on the system☆146Updated 2 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆44Updated 2 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- In-Memory Rootkit For Linux and BSD☆86Updated 3 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆161Updated 4 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆320Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆145Updated last year
- Stage 0☆165Updated 11 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- ☆108Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆200Updated 2 months ago